Vulnerabilities > CVE-1999-1557 - Denial-Of-Service vulnerability in Ipswitch Imail 5.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability. CVE-1999-1557. Dos exploits for multiple platform |
id | EDB-ID:19377 |
last seen | 2016-02-02 |
modified | 1999-03-01 |
published | 1999-03-01 |
reporter | Marc of eEye |
source | https://www.exploit-db.com/download/19377/ |
title | Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability |
Nessus
NASL family | Gain a shell remotely |
NASL id | IMAIL_IMAPD_OVERFLOW.NASL |
description | The remote host is running IMail IMAP server. The installed version is affected by a buffer overflow when handling a long user name, or a long password. An attacker, exploiting this flaw, could cause a denial of service, or possibly execute arbitrary code subject to the permissions of the IMAP server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10123 |
published | 1999-06-22 |
reporter | This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10123 |
title | IMail IMAP Server Login Functions Remote Overflow |