Vulnerabilities > Ipswitch > Imail > 8.11

DATE CVE VULNERABILITY TITLE RISK
2011-03-16 CVE-2011-1430 Improper Input Validation vulnerability in Ipswitch Imail
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
network
ipswitch CWE-20
6.8
2009-01-27 CVE-2007-2795 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ipswitch Imail
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
network
low complexity
ipswitch CWE-119
critical
9.0
2007-09-26 CVE-2007-5094 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ipswitch Imail
Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.
network
low complexity
ipswitch CWE-119
7.5
2005-05-25 CVE-2005-1254 Multiple vulnerability in Ipswitch IMail Server
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument.
network
low complexity
ipswitch
5.0