Ipswitch IMail Server < 11.02 Multiple Vulnerabilities

critical Nessus Plugin ID 47743

Synopsis

The remote mail server is affected by multiple vulnerabilities.

Description

The remote host appears to be running Ipswitch IMail Server prior to version 11.02. It is, therefore, affected by multiple issues :

- By sending a specially crafted message to imailsrv.exe with multiple 'Reply-To' headers set, it may be possible for a remote, unauthenticated attacker to execute arbitrary code on the remote system. (ZDI-10-126)

- By sending a specially crafted message containing '?Q?' operator, it may be possible for a remote, authenticated attacker to execute arbitrary code on the remote system with SYSTEM privileges. (ZDI-10-127)

- By sending a specially crafted message with a overly long '-NOTIFY' argument, it may be possible for a remote, unauthenticated attacker to execute arbitrary code on the remote system. (ZDI-10-128)

Solution

Upgrade to Ipswitch IMail Server version 11.02 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-10-126/

https://www.zerodayinitiative.com/advisories/ZDI-10-127/

https://www.zerodayinitiative.com/advisories/ZDI-10-128/

https://seclists.org/fulldisclosure/2010/Jul/230

https://seclists.org/fulldisclosure/2010/Jul/231

https://seclists.org/fulldisclosure/2010/Jul/232

Plugin Details

Severity: Critical

ID: 47743

File Name: ipswitch_imail_11_02.nasl

Version: 1.10

Type: remote

Family: Misc.

Published: 7/16/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Exploit Ease: No known exploits are available

Patch Publication Date: 7/15/2010

Vulnerability Publication Date: 7/15/2010

Reference Information

BID: 41717, 41718, 41719

SECUNIA: 40638