// For flags

CVE-2005-3526

Ipswitch Collaboration Suite Code Execution Vulnerability

Severity Score

6.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch Collaboration Suite. Authentication is required to exploit this vulnerability.
This specific flaw exists within the IMAP daemon. A lack of bounds checking during the parsing of long arguments to the FETCH verb can result in an exploitable buffer overflow.

*Credits: Manuel Santamarina Suarez
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-11-08 CVE Reserved
  • 2005-12-31 CVE Published
  • 2024-07-02 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ipswitch
Search vendor "Ipswitch"
Ipswitch Collaboration Suite
Search vendor "Ipswitch" for product "Ipswitch Collaboration Suite"
2006.02_premium
Search vendor "Ipswitch" for product "Ipswitch Collaboration Suite" and version "2006.02_premium"
-
Affected
Ipswitch
Search vendor "Ipswitch"
Ipswitch Collaboration Suite
Search vendor "Ipswitch" for product "Ipswitch Collaboration Suite"
2006.02_standard
Search vendor "Ipswitch" for product "Ipswitch Collaboration Suite" and version "2006.02_standard"
-
Affected