8 results (0.004 seconds)

CVSS: 6.8EPSS: 0%CPEs: 47EXPL: 0

The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación del servidor Ipswitch IMail v11.03 no restringe el búfer I/O de forma adecuada, lo que permite a los atacantes "man-in-the-middle insertar comandos en las sesiones SMTP cifrado mediante el envío de un comando de texto plano que se procesa después de que TLS está en su lugar, relacionado con un ataque "inyección de de comando en texto claro", un problema similar a CVE -2011- 0411. • http://secunia.com/advisories/43676 http://www.kb.cert.org/vuls/id/555316 http://www.kb.cert.org/vuls/id/MAPG-8DBRD4 http://www.osvdb.org/71020 http://www.securityfocus.com/bid/46767 http://www.vupen.com/english/advisories/2011/0609 https://exchange.xforce.ibmcloud.com/vulnerabilities/65932 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 16%CPEs: 2EXPL: 1

Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. Múltiple desbordamiento de búfer en Ipswitch IMail en versiones anteriores a 2006.21, permite a los atacantes remotos o usuarios autenticados ejecutar arbitrariamente código a través de (1) la característica de autenticación en IMailsec.dll, el cual lanza una corrupción del montículo en IMail Server, o (2) a comando largo SUBSCRIBE IMAP, el cual laza un desbordamiento de búfer basado en pila en el Daemon IMAP. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Ipswitch IMail and ICS server. Authentication is required to exploit this vulnerability. The specific flaw exists due to a lack of bounds checking during theparsing of arguments to the SUBSCRIBE IMAP command sent to the IMAP daemon listening by default on TCP port 143. By providing an overly long string as the argument, an exploitable stack-based buffer overflow occurs. • https://www.exploit-db.com/exploits/9662 http://www.ipswitch.com/support/imail/releases/im200621.asp http://www.zerodayinitiative.com/advisories/ZDI-07-042 http://www.zerodayinitiative.com/advisories/ZDI-07-043 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 0

Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. • http://securitytracker.com/id?1014047 http://www.idefense.com/application/poi/display?id=241&type=vulnerabilities http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html http://www.securityfocus.com/bid/13727 •

CVSS: 5.0EPSS: 0%CPEs: 28EXPL: 0

Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content." • http://secunia.com/advisories/12453 http://securitytracker.com/id?1011146 http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES http://www.osvdb.org/9553 http://www.securityfocus.com/bid/11106 https://exchange.xforce.ibmcloud.com/vulnerabilities/17220 •

CVSS: 5.0EPSS: 1%CPEs: 28EXPL: 0

Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component. • http://secunia.com/advisories/12453 http://securitytracker.com/id?1011146 http://support.ipswitch.com/kb/IM-20040902-DM01.htm#FIXES http://www.osvdb.org/9552 http://www.osvdb.org/9554 http://www.securityfocus.com/bid/11106 https://exchange.xforce.ibmcloud.com/vulnerabilities/17219 https://exchange.xforce.ibmcloud.com/vulnerabilities/17222 •