Lucene search

K
saintSAINT CorporationSAINT:33FDEB100345344D422E91F92603C691
HistoryJul 27, 2007 - 12:00 a.m.

Ipswitch IMail Server IMAP SEARCH buffer overflow

2007-07-2700:00:00
SAINT Corporation
download.saintcorporation.com
15

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.973

Percentile

99.9%

Added: 07/27/2007
CVE: CVE-2007-3925
BID: 24962
OSVDB: 36219

Background

IMail is an e-mail server for Windows platforms.

Problem

A buffer overflow vulnerability in the IMAP service could allow an authenticated attacker to execute arbitrary commands by sending a specially crafted SEARCH command.

Resolution

Upgrade to Ipswitch IMail Server version 2006.21.

References

<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563&gt;

Limitations

Exploit works on Ipswitch IMail Server 2006.1. A valid IMAP login and password are required.

Platforms

Windows 2000
Windows Server 2003

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.973

Percentile

99.9%