IMAP: IPSwitch IMAP Server STATUS Overflow

This signature detects attempts to exploit a known vulnerability in Ipswitch IMail IMAP server. The IMail server does not perform sufficient boundary checking when processing a STATUS command. Remote attackers can include a long mailbox name argument within a maliciously crafted STATUS command to overflow a stack buffer and execute arbitrary code with system level privileges.

Extended Description

Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code. The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues.

Affected Products

Ipswitch imail

Short Name
IMAP:IPSWITCH:STATUS-OF
Severity
Major
Recommended
False
Recommended Action
None
Category
IMAP
Keywords
CVE-2005-1256 IMAP IPSwitch Overflow STATUS Server bid:13727
Release Date
06/15/2005
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3726
False Positive
Unknown
Vendors

Ipswitch

CVSS Score

10.0

Found a potential security threat?