Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.10994
Category:SMTP problems
Title:IPSwitch IMail SMTP Buffer Overflow
Summary:A vulnerability exists within IMail that allows remote attackers to gain SYSTEM level; access to servers running IMail's SMTP daemon (versions 6.06 and below).
Description:Summary:
A vulnerability exists within IMail that allows remote attackers to gain SYSTEM level
access to servers running IMail's SMTP daemon (versions 6.06 and below).

Vulnerability Insight:
The vulnerability stems from the IMail SMTP daemon not doing proper bounds checking on
various input data that gets passed to the IMail Mailing List handler code.

Vulnerability Impact:
If an attacker crafts a special buffer and sends it to a remote IMail SMTP server
it is possible that an attacker can remotely execute code (commands) on the IMail system.

Solution:
Download the latest patch from the linked references.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: BugTraq ID: 2083
BugTraq ID: 2651
Common Vulnerability Exposure (CVE) ID: CVE-2001-0039
http://www.securityfocus.com/bid/2083
Bugtraq: 20001206 DoS by SMTP AUTH command in IPSwitch IMail server (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html
XForce ISS Database: imail-smtp-auth-dos(5674)
https://exchange.xforce.ibmcloud.com/vulnerabilities/5674
Common Vulnerability Exposure (CVE) ID: CVE-2001-0494
Bugtraq: 20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html
http://www.osvdb.org/5610
XForce ISS Database: ipswitch-imail-smtp-bo(6445)
https://exchange.xforce.ibmcloud.com/vulnerabilities/6445
CopyrightThis script is Copyright (C) 2002 Digital Defense, Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2022 E-Soft Inc. All rights reserved.