Vulnerabilities > CVE-2005-1255 - Unspecified vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN ipswitch
exploit available
Summary
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description IPSwitch IMAP Server LOGON Remote Stack Overflow. CVE-2005-1255. Remote exploit for windows platform id EDB-ID:1035 last seen 2016-01-31 modified 2005-06-07 published 2005-06-07 reporter nolimit source https://www.exploit-db.com/download/1035/ title IPSwitch IMAP Server LOGON Remote Stack Overflow description IPSwitch IMail Server. CVE-2005-1255. Remote exploit for linux platform id EDB-ID:1124 last seen 2016-01-31 modified 2005-08-01 published 2005-08-01 reporter kingcope source https://www.exploit-db.com/download/1124/ title IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
Saint
bid 13727 description IMail IMAP STATUS buffer overflow id mail_imap_imail osvdb 16806 title imail_imap_status type remote bid 13727 description IMail IMAP LOGIN special character vulnerability id mail_imap_imail osvdb 16804 title imail_imap_login_specialchar type remote
References
- http://securitytracker.com/id?1014047
- http://securitytracker.com/id?1014047
- http://www.idefense.com/application/poi/display?id=243&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=243&type=vulnerabilities
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.securityfocus.com/bid/13727
- http://www.securityfocus.com/bid/13727