Vulnerabilities > CVE-2006-4379 - Unspecified vulnerability in Ipswitch products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Exploit-Db
description Ipswitch IMail Server 2006 / 8.x (RCPT) Remote Stack Overflow Exploit. CVE-2006-4379. Remote exploit for windows platform id EDB-ID:2601 last seen 2016-01-31 modified 2006-10-19 published 2006-10-19 reporter Greg Linares source https://www.exploit-db.com/download/2601/ title Ipswitch IMail Server 2006 / 8.x RCPT Remote Stack Overflow Exploit description Imail 8.10-8.12 (RCPT TO) Remote Buffer Overflow Exploit (meta). CVE-2006-4379. Remote exploit for windows platform id EDB-ID:3265 last seen 2016-01-31 modified 2007-02-04 published 2007-02-04 reporter Jacopo Cervini source https://www.exploit-db.com/download/3265/ title Imail 8.10-8.12 RCPT TO Remote Buffer Overflow Exploit meta
Nessus
NASL family | SMTP problems |
NASL id | IPSWITCH_IMAIL_2006.1.NASL |
description | The remote host is running Ipswitch Collaboration Suite / IMail Secure Server / IMail Server, commercial messaging and collaboration suites for Windows. According to its banner, the version of Ipswitch Collaboration Suite / IMail Secure Server / IMail Server installed on the remote host has a stack-based buffer overflow in its SMTP server component that can be triggered by long strings within the characters |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22314 |
published | 2006-09-08 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22314 |
title | Ipswitch IMail Server SMTP Service Crafted RCPT String Remote Overflow |
code |
|
Saint
bid | 19885 |
description | IMail SMTP RCPT TO buffer overflow |
id | mail_smtp_imail |
osvdb | 28576 |
title | imail_smtp_rcpt_to |
type | remote |
References
- http://www.zerodayinitiative.com/advisories/ZDI-06-028.html
- http://www.ipswitch.com/support/ics/updates/ics20061.asp
- http://www.ipswitch.com/support/imail/releases/im20061.asp
- http://www.securityfocus.com/bid/19885
- http://secunia.com/advisories/21795
- http://securitytracker.com/id?1016803
- http://securitytracker.com/id?1016804
- http://www.vupen.com/english/advisories/2006/3496
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28789
- http://www.securityfocus.com/archive/1/445521/100/0/threaded