Lucene search

K
cveMitreCVE-2005-1256
HistoryMay 25, 2005 - 4:00 a.m.

CVE-2005-1256

2005-05-2504:00:00
mitre
web.nvd.nist.gov
27
cve-2005-1256
imail
buffer overflow
remote code execution
authentication
nvd

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.6

Confidence

Low

EPSS

0.765

Percentile

98.2%

Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.

Affected configurations

Nvd
Node
ipswitchimailMatch8.13
OR
ipswitchimail_serverRange8.2_hotfix_2
OR
ipswitchipswitch_collaboration_suite
VendorProductVersionCPE
ipswitchimail8.13cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
ipswitchimail_server*cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*
ipswitchipswitch_collaboration_suite*cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.6

Confidence

Low

EPSS

0.765

Percentile

98.2%

Related for CVE-2005-1256