CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
99.5%
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an ‘@’ character and before a ‘:’ character.
Vendor | Product | Version | CPE |
---|---|---|---|
ipswitch | imail_plus | 2006 | cpe:2.3:a:ipswitch:imail_plus:2006:*:*:*:*:*:*:* |
ipswitch | imail_secure_server | 2006 | cpe:2.3:a:ipswitch:imail_secure_server:2006:*:*:*:*:*:*:* |
ipswitch | ipswitch_collaboration_suite | 2006_premium | cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_premium:*:*:*:*:*:*:* |
ipswitch | ipswitch_collaboration_suite | 2006_standard | cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_standard:*:*:*:*:*:*:* |
secunia.com/advisories/21795
securitytracker.com/id?1016803
securitytracker.com/id?1016804
www.ipswitch.com/support/ics/updates/ics20061.asp
www.ipswitch.com/support/imail/releases/im20061.asp
www.securityfocus.com/archive/1/445521/100/0/threaded
www.securityfocus.com/bid/19885
www.vupen.com/english/advisories/2006/3496
www.zerodayinitiative.com/advisories/ZDI-06-028.html
exchange.xforce.ibmcloud.com/vulnerabilities/28789