Page 11 of 125 results (0.008 seconds)

CVSS: 9.0EPSS: 16%CPEs: 2EXPL: 1

Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. Múltiple desbordamiento de búfer en Ipswitch IMail en versiones anteriores a 2006.21, permite a los atacantes remotos o usuarios autenticados ejecutar arbitrariamente código a través de (1) la característica de autenticación en IMailsec.dll, el cual lanza una corrupción del montículo en IMail Server, o (2) a comando largo SUBSCRIBE IMAP, el cual laza un desbordamiento de búfer basado en pila en el Daemon IMAP. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Ipswitch IMail and ICS server. Authentication is required to exploit this vulnerability. The specific flaw exists due to a lack of bounds checking during theparsing of arguments to the SUBSCRIBE IMAP command sent to the IMAP daemon listening by default on TCP port 143. By providing an overly long string as the argument, an exploitable stack-based buffer overflow occurs. • https://www.exploit-db.com/exploits/9662 http://www.ipswitch.com/support/imail/releases/im200621.asp http://www.zerodayinitiative.com/advisories/ZDI-07-042 http://www.zerodayinitiative.com/advisories/ZDI-07-043 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 24%CPEs: 1EXPL: 0

The Logging Server (Logsrv.exe) in IPSwitch WS_FTP 7.5.29.0 allows remote attackers to cause a denial of service (daemon crash) by sending a crafted packet containing a long string to port 5151/udp. The Logging Server (Logsrv.exe) en IPSwitch WS_FTP 7.5.29.0 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) enviando un paquete artesanal que contiene una cadena larga al puerto 5151/udp. • http://packetstormsecurity.org/0707-advisories/wsftp75290-dos.txt http://secunia.com/advisories/26040 http://www.osvdb.org/36218 http://www.vdalabs.com/tools/ipswitch.html https://exchange.xforce.ibmcloud.com/vulnerabilities/35396 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in MIBEXTRA.EXE in Ipswitch WhatsUp Gold 11 allows attackers to cause a denial of service (application crash) or execute arbitrary code via a long MIB filename argument. NOTE: If there is not a common scenario under which MIBEXTRA.EXE is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE. Desbordamiento de búfer en el MIBEXTRA.EXE del Ipswitch WhatsUp Gold 11 permite a los atacantes provocar una denegación de servicio (caída de la aplicación) o ejecutar código de su elección a través de un argumento de nombre de fichero MIB largo. NOTA: Si no hay un escenario común bajo el que el MIBEXTRA.EXE es llamado con un ataque controlado por argumentos de línea de comandos, tal vez esta vulnerabilidad no debería de incluirse en el CVE. • http://osvdb.org/36217 http://securityreason.com/securityalert/2708 http://www.securityfocus.com/archive/1/468070/100/0/threaded •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 0

Unspecified vulnerability in the Initialize function in NetscapeFTPHandler in WS_FTP Home and Professional 2007 allows remote attackers to cause a denial of service (NULL dereference and application crash) via unspecified vectors related to "improper arguments." Vulnerabilidad no especificada en la función Initialize en NetscapeFTPHandler en WS_FTP Home y Professional 2007 permite a atacantes remotos provocar denegación de servicio (referencia NULL y caida de aplicación) a través de vectores no especificados relacionado con "argumentos impropios". • http://www.securityfocus.com/archive/1/466576/100/0/threaded http://www.securityfocus.com/archive/1/466647/100/0/threaded http://www.securityfocus.com/bid/23584 https://exchange.xforce.ibmcloud.com/vulnerabilities/33846 •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. Múltiples desbordamientos de búfer en el control ActiveX IMAILAPILib (IMailAPI.dll) en Ipswitch IMail Server anterior a 2006.2 permite a atacantes remotos ejecutar código de su elección a través de los miembros (1) WebConnect y (2) Connect en el control (a)IMailServer; miembros (3) Sync3 y (4) Init3 en el control (b) IMailLDAPService y el miembro (5) SetReplyTo en el control (c)IMailUserCollection. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487 http://secunia.com/advisories/24422 http://support.ipswitch.com/kb/IM-20070305-JH01.htm http://www.securitytracker.com/id?1017737 http://www.vupen.com/english/advisories/2007/0853 •