IMAP: IPSwitch IMAP Server FETCH Overflow
This signature detects attempts to exploit a known vulnerability in the Ipswitch IMail server. Due to insufficient validation checks in the processing of the IMAP FETCH command, an authenticated remote attacker can exploit this vulnerability and cause a buffer overflow; thereby allowing the attacker to cause a denial-of-service condition or execute arbitrary code in the context of the vulnerable service.
Extended Description
Ipswitch IMail Server / Collaboration Suite are prone to a remote buffer-overflow vulnerability. The vulnerability presents itself when the server handles a specially crafted IMAP FETCH command. This may result in memory corruption leading to a denial-of-service condition or arbitrary code execution.
Affected Products
Ipswitch ipswitch_collaboration_suite_standard_edition
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Ipswitch
6.5