2 results (0.002 seconds)

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control. Múltiples desbordamientos de búfer en el control ActiveX IMAILAPILib (IMailAPI.dll) en Ipswitch IMail Server anterior a 2006.2 permite a atacantes remotos ejecutar código de su elección a través de los miembros (1) WebConnect y (2) Connect en el control (a)IMailServer; miembros (3) Sync3 y (4) Init3 en el control (b) IMailLDAPService y el miembro (5) SetReplyTo en el control (c)IMailUserCollection. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=487 http://secunia.com/advisories/24422 http://support.ipswitch.com/kb/IM-20070305-JH01.htm http://www.securitytracker.com/id?1017737 http://www.vupen.com/english/advisories/2007/0853 •

CVSS: 7.5EPSS: 96%CPEs: 4EXPL: 3

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character. Desbordamiento de búfer basado en montón en SMTP Daemon en Ipswitch Collaboration 2006 Suite Premium y Standard Editions, IMail, IMail Plus, e IMail Secure, permite a un atacante remoto ejecutar código de su elección a través de una cadena larga situada después del caracter “@” y antes del carácter “: ”. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch Collaboration Suite and IMail. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SMTP daemon. A lack of bounds checking during the parsing of long strings contained within the characters '@' and ':' leads to a stack overflow vulnerability. • https://www.exploit-db.com/exploits/2601 https://www.exploit-db.com/exploits/3264 https://www.exploit-db.com/exploits/3265 http://secunia.com/advisories/21795 http://securitytracker.com/id?1016803 http://securitytracker.com/id?1016804 http://www.ipswitch.com/support/ics/updates/ics20061.asp http://www.ipswitch.com/support/imail/releases/im20061.asp http://www.securityfocus.com/archive/1/445521/100/0/threaded http://www.securityfocus.com/bid/19885 http://www.vupen.com& •