Summary
Detail | |||
---|---|---|---|
Vendor | Ipswitch | First view | 1999-12-21 |
Product | Imail | Last view | 2011-03-16 |
Version | 5.0.8 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:ipswitch:imail |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.8 | 2011-03-16 | CVE-2011-1430 | The STARTTLS implementation in the server in Ipswitch IMail 11.03 and earlier does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. |
9 | 2009-01-27 | CVE-2007-2795 | Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. |
5 | 2004-12-31 | CVE-2004-2423 | Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content." |
5 | 2004-12-31 | CVE-2004-2422 | Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component. |
10 | 2002-08-12 | CVE-2002-0777 | Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. |
7.5 | 2001-06-27 | CVE-2001-0494 | Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header. |
5 | 2000-04-06 | CVE-2000-0301 | Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command. |
5 | 2000-01-05 | CVE-2000-0056 | IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. |
7.2 | 1999-12-21 | CVE-1999-1497 | Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
50% (1) | CWE-20 | Improper Input Validation |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
71020 | Ipswitch IMail Server STARTTLS Arbitrary Plaintext Command Injection |
36222 | Ipswitch IMail IMAP SUBSCRIBE Command Overflow |
36221 | Ipswitch IMail Imailsec.dll Authentication Overflow |
9554 | Ipswitch IMail Web Messaging To: Line DoS |
9553 | Ipswitch IMail Web Calendar Malformed Content DoS |
9552 | Ipswitch IMail Queue Manager Sender Field DoS |
9007 | Ipswitch IMail Registry Key Weak Encryption Password Storage |
5610 | Ipswitch IMail SMTP Server Overflow |
5071 | Ipswitch IMail LDAP Bind DN Overflow |
1276 | Ipswitch IMail Server Eudora AUTH DoS |
1190 | Ipswitch IMail IMonitor status.cgi DoS |
ExploitDB Exploits
id | Description |
---|---|
9662 | IPSwitch IMAP Server <= 9.20 Remote Buffer Overflow Exploit |
OpenVAS Exploits
id | Description |
---|---|
2011-03-25 | Name : Ipswitch IMail Server STARTTLS Plaintext Command Injection Vulnerability File : nvt/secpod_ipswitch_imail_server_starttls_cmd_inj_vuln.nasl |
2005-11-03 | Name : IPSwitch IMail SMTP Buffer Overflow File : nvt/DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl |
2005-11-03 | Name : ipswitch IMail DoS File : nvt/ipswitch_IMail_bo.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | login buffer overflow attempt RuleID : 1842-community - Type : PROTOCOL-IMAP - Revision : 34 |
2014-01-10 | login buffer overflow attempt RuleID : 1842 - Type : PROTOCOL-IMAP - Revision : 34 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2011-03-10 | Name: The remote mail service allows plaintext command injection while negotiating ... File: smtp_starttls_plaintext_injection.nasl - Type: ACT_ATTACK |
2007-07-19 | Name: The remote mail server is affected by multiple vulnerabilities. File: ipswitch_imail_2006_21.nasl - Type: ACT_GATHER_INFO |
2004-09-08 | Name: The remote mail server is affected by multiple denial of service vulnerabilit... File: ipswitch_IMail_bo.nasl - Type: ACT_GATHER_INFO |
2002-06-05 | Name: It may be possible to execute arbitrary commands on the remote system. File: DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl - Type: ACT_GATHER_INFO |
1999-06-22 | Name: The remote IMAP server is affected by a buffer overflow vulnerability. File: imail_imonitor_overflow.nasl - Type: ACT_GATHER_INFO |