Vulnerabilities > Ipswitch > Imail > 8.12

DATE CVE VULNERABILITY TITLE RISK
2011-03-16 CVE-2011-1430 Improper Input Validation vulnerability in Ipswitch Imail
The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
network
ipswitch CWE-20
6.8
2009-01-27 CVE-2007-2795 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ipswitch Imail
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
network
low complexity
ipswitch CWE-119
critical
9.0
2005-05-25 CVE-2005-1255 Multiple vulnerability in Ipswitch Imail, Imail Server and Ipswitch Collaboration Suite
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
network
low complexity
ipswitch
critical
10.0
2005-05-25 CVE-2005-1254 Multiple vulnerability in Ipswitch IMail Server
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument.
network
low complexity
ipswitch
5.0