Vulnerabilities > CVE-2005-1256 - Unspecified vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Saint
bid 13727 description IMail IMAP STATUS buffer overflow id mail_imap_imail osvdb 16806 title imail_imap_status type remote bid 13727 description IMail IMAP LOGIN special character vulnerability id mail_imap_imail osvdb 16804 title imail_imap_login_specialchar type remote
References
- http://securitytracker.com/id?1014047
- http://securitytracker.com/id?1014047
- http://www.idefense.com/application/poi/display?id=244&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=244&type=vulnerabilities
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html
- http://www.securityfocus.com/bid/13727
- http://www.securityfocus.com/bid/13727