35 results (0.004 seconds)

CVSS: 6.8EPSS: 0%CPEs: 47EXPL: 0

The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación del servidor Ipswitch IMail v11.03 no restringe el búfer I/O de forma adecuada, lo que permite a los atacantes "man-in-the-middle insertar comandos en las sesiones SMTP cifrado mediante el envío de un comando de texto plano que se procesa después de que TLS está en su lugar, relacionado con un ataque "inyección de de comando en texto claro", un problema similar a CVE -2011- 0411. • http://secunia.com/advisories/43676 http://www.kb.cert.org/vuls/id/555316 http://www.kb.cert.org/vuls/id/MAPG-8DBRD4 http://www.osvdb.org/71020 http://www.securityfocus.com/bid/46767 http://www.vupen.com/english/advisories/2011/0609 https://exchange.xforce.ibmcloud.com/vulnerabilities/65932 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 7%CPEs: 5EXPL: 2

Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line. Desbordamiento de búfer basado en montículo en iaspam.dll en el servidor SMTP de Ipswitch IMail Server 8.01 hasta 8.11 permite a atacantes remotos ejecutar código de su elección mediante un conjunto de 4 mensajes de correo electrónico diferentes con un parámetro bounday largo en una determinada línea de cabecera Content-Type malformada, la cadena "MIME" por si misma en una línea en la cabecera, y un línea larga de cabecera Content-Transfer-Encoding. • https://www.exploit-db.com/exploits/4438 http://osvdb.org/39390 http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html http://www.securityfocus.com/bid/25762 https://exchange.xforce.ibmcloud.com/vulnerabilities/36723 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 16%CPEs: 2EXPL: 1

Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. Múltiple desbordamiento de búfer en Ipswitch IMail en versiones anteriores a 2006.21, permite a los atacantes remotos o usuarios autenticados ejecutar arbitrariamente código a través de (1) la característica de autenticación en IMailsec.dll, el cual lanza una corrupción del montículo en IMail Server, o (2) a comando largo SUBSCRIBE IMAP, el cual laza un desbordamiento de búfer basado en pila en el Daemon IMAP. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Ipswitch IMail and ICS server. Authentication is required to exploit this vulnerability. The specific flaw exists due to a lack of bounds checking during theparsing of arguments to the SUBSCRIBE IMAP command sent to the IMAP daemon listening by default on TCP port 143. By providing an overly long string as the argument, an exploitable stack-based buffer overflow occurs. • https://www.exploit-db.com/exploits/9662 http://www.ipswitch.com/support/imail/releases/im200621.asp http://www.zerodayinitiative.com/advisories/ZDI-07-042 http://www.zerodayinitiative.com/advisories/ZDI-07-043 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 76%CPEs: 3EXPL: 0

Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=244&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=242&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •