Vulnerabilities > CVE-2005-1249 - Unspecified vulnerability in Ipswitch Collaboration Suite
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Saint
bid 13727 description IMail IMAP STATUS buffer overflow id mail_imap_imail osvdb 16806 title imail_imap_status type remote bid 13727 description IMail IMAP LOGIN special character vulnerability id mail_imap_imail osvdb 16804 title imail_imap_login_specialchar type remote
References
- http://securitytracker.com/id?1014047
- http://securitytracker.com/id?1014047
- http://www.idefense.com/application/poi/display?id=245&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=245&type=vulnerabilities
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.securityfocus.com/bid/13727
- http://www.securityfocus.com/bid/13727