// For flags

CVE-2005-1255

IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-04-25 CVE Reserved
  • 2005-05-25 CVE Published
  • 2005-06-07 First Exploit
  • 2024-05-01 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ipswitch
Search vendor "Ipswitch"
Imail
Search vendor "Ipswitch" for product "Imail"
8.12
Search vendor "Ipswitch" for product "Imail" and version "8.12"
-
Affected
Ipswitch
Search vendor "Ipswitch"
Imail
Search vendor "Ipswitch" for product "Imail"
8.13
Search vendor "Ipswitch" for product "Imail" and version "8.13"
-
Affected
Ipswitch
Search vendor "Ipswitch"
Imail Server
Search vendor "Ipswitch" for product "Imail Server"
<= 8.2_hotfix_2
Search vendor "Ipswitch" for product "Imail Server" and version " <= 8.2_hotfix_2"
-
Affected
Ipswitch
Search vendor "Ipswitch"
Ipswitch Collaboration Suite
Search vendor "Ipswitch" for product "Ipswitch Collaboration Suite"
*-
Affected