Ipswitch IMail < 8.15 Hotfix 1 IMAP EXAMINE Argument Buffer Overflow

high Nessus Network Monitor Plugin ID 2695

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running a version of the Ipswitch Collaboration
Suite / Ipswitch IMail IMAP server that is prone to a buffer overflow
when processing an EXAMINE command with a long argument.
Specifically, if an authenticated attacker sends an EXAMINE command
with a malformed mailbox name of 259 bytes, the attacker will overwrite the
saved stack frame pointer and potentially gain control of process
execution.

Solution

Apply IMail Server 8.15 Hotfix 1 (February 3, 2005) or upgrade to a version greater than 8.15 when it becomes available.

See Also

http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities

Plugin Details

Severity: High

ID: 2695

Family: SMTP Servers

Published: 3/10/2005

Updated: 3/6/2019

Nessus ID: 17311

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Reference Information

CVE: CVE-2005-0707

BID: 12780