Vulnerabilities > CVE-1999-1557 - Denial-Of-Service vulnerability in Ipswitch Imail 5.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
ipswitch
nessus
exploit available

Summary

Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.

Vulnerable Configurations

Part Description Count
Application
Ipswitch
1

Exploit-Db

descriptionIpswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability. CVE-1999-1557. Dos exploits for multiple platform
idEDB-ID:19377
last seen2016-02-02
modified1999-03-01
published1999-03-01
reporterMarc of eEye
sourcehttps://www.exploit-db.com/download/19377/
titleIpswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability

Nessus

NASL familyGain a shell remotely
NASL idIMAIL_IMAPD_OVERFLOW.NASL
descriptionThe remote host is running IMail IMAP server. The installed version is affected by a buffer overflow when handling a long user name, or a long password. An attacker, exploiting this flaw, could cause a denial of service, or possibly execute arbitrary code subject to the permissions of the IMAP server.
last seen2020-06-01
modified2020-06-02
plugin id10123
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10123
titleIMail IMAP Server Login Functions Remote Overflow