Ipswitch IMail < 8.15 Hotfix 1 IMAP EXAMINE Argument Buffer Overflow

High Nessus Network Monitor Plugin ID 2695

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running a version of the Ipswitch Collaboration
Suite / Ipswitch IMail IMAP server that is prone to a buffer overflow
when processing an EXAMINE command with a long argument.
Specifically, if an authenticated attacker sends an EXAMINE command
with a malformed mailbox name of 259 bytes, the attacker will overwrite the
saved stack frame pointer and potentially gain control of process
execution.

Solution

Apply IMail Server 8.15 Hotfix 1 (February 3, 2005) or upgrade to a version greater than 8.15 when it becomes available.

See Also

http://www.idefense.com/application/poi/display?id=216&amp;type=vulnerabilities

Plugin Details

Severity: High

ID: 2695

Family: SMTP Servers

Published: 2005/03/10

Modified: 2016/02/05

Dependencies: 2004, 2005

Nessus ID: 17311

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 8.7

Temporal Score: 7.5

Vector: CVSS3#AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Reference Information

CVE: CVE-2005-0707

BID: 12780