CVE-2007-2795
Ipswitch IMail IMAP Daemon SUBSCRIBE Stack Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
Múltiple desbordamiento de búfer en Ipswitch IMail en versiones anteriores a 2006.21, permite a los atacantes remotos o usuarios autenticados ejecutar arbitrariamente código a través de (1) la característica de autenticación en IMailsec.dll, el cual lanza una corrupción del montículo en IMail Server, o (2) a comando largo SUBSCRIBE IMAP, el cual laza un desbordamiento de búfer basado en pila en el Daemon IMAP.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Ipswitch IMail and ICS server. Authentication is required to exploit this vulnerability.
The specific flaw exists due to a lack of bounds checking during theparsing of arguments to the SUBSCRIBE IMAP command sent to the IMAP daemon listening by default on TCP port 143. By providing an overly long string as the argument, an exploitable stack-based buffer overflow occurs.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-05-21 CVE Reserved
- 2007-07-19 CVE Published
- 2009-09-14 First Exploit
- 2024-09-17 CVE Updated
- 2024-10-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/9662 | 2009-09-14 |
URL | Date | SRC |
---|---|---|
http://www.ipswitch.com/support/imail/releases/im200621.asp | 2009-01-28 | |
http://www.zerodayinitiative.com/advisories/ZDI-07-042 | 2009-01-28 | |
http://www.zerodayinitiative.com/advisories/ZDI-07-043 | 2009-01-28 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ipswitch Search vendor "Ipswitch" | Imail Search vendor "Ipswitch" for product "Imail" | <= 2006.2 Search vendor "Ipswitch" for product "Imail" and version " <= 2006.2" | - |
Affected
| ||||||
Ipswitch Search vendor "Ipswitch" | Imail Search vendor "Ipswitch" for product "Imail" | 2006.1 Search vendor "Ipswitch" for product "Imail" and version "2006.1" | - |
Affected
|