FTGate4 IMAP EXAMINE Command Remote Overflow

Critical Nessus Plugin ID 20221


The remote IMAP server is prone to a buffer overflow.


The remote host appears to be running a version of FTGate, a commercial groupware mail server for Windows from FTGate Technology Ltd.

The version of FTGate installed on the remote host includes an IMAP server that is prone to a buffer overflow attack due to boundary errors in its handling of various IMAP commands. An authenticated attacker can exploit this issue to crash the application itself and possibly to execute arbitrary code subject to the privileges of the SYSTEM user.


Upgrade to FTGate 4.4.002 or later.

See Also



Plugin Details

Severity: Critical

ID: 20221

File Name: ftgate_overflow.nasl

Version: $Revision: 1.19 $

Type: remote

Published: 2005/11/17

Modified: 2011/03/11

Dependencies: 10125, 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2005/11/16

Reference Information

CVE: CVE-2005-3640

BID: 15449

OSVDB: 20917