Ipswitch IMail Server < 2006.2 Multiple Remote Overflows

High Nessus Plugin ID 24782


The remote mail server is affected by multiple buffer overflow vulnerabilities.


The remote host is running Ipswitch Collaboration Suite / IMail, commercial messaging and collaboration suites for Windows.

According to its banner, the version of Ipswitch Collaboration Suite / IMail installed on the remote host has several unspecified buffer overflows in various service components and ActiveX controls. An attacker may be able to leverage these issues to crash the affected service or even to execute arbitrary code remotely, by default with LOCAL SYSTEM privileges.


Upgrade to version 2006.2 of the appropriate application.

See Also





Plugin Details

Severity: High

ID: 24782

File Name: ipswitch_imail_2006_2.nasl

Version: $Revision: 1.18 $

Type: remote

Agent: windows

Family: Windows

Published: 2007/03/07

Modified: 2016/10/27

Dependencies: 11414, 10185, 10263

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2007/03/07

Reference Information

CVE: CVE-2007-1637

BID: 22852

OSVDB: 33648