Vulnerability Name: | CVE-2004-0297 (CCN-15243) | ||||||||
Assigned: | 2004-02-17 | ||||||||
Published: | 2004-02-17 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9.15.10) in Ipswitch IMail Server 8.03 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via an LDAP message with a large tag length. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-0297 Source: IDEFENSE Type: UNKNOWN 20040217 Ipswitch IMail LDAP Daemon Remote Buffer Overflow Source: CCN Type: iDEFENSE Security Advisory 02.17.04 Ipswitch IMail LDAP Daemon Remote Buffer Overflow Source: CCN Type: Ipswitch Web site IMail Server 8.05 Hotfix 2 Source: CONFIRM Type: UNKNOWN http://www.ipswitch.com/support/imail/releases/imail_professional/im805HF2.html Source: CCN Type: US-CERT VU#972334 IMail Server LDAP daemon buffer overflow Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#972334 Source: OSVDB Type: UNKNOWN 3984 Source: CCN Type: OSVDB ID: 3984 Ipswitch IMail LDAP Large Tag Overflow Source: CCN Type: SecuriTeam Mailing List, Security Holes & Exploits 22 Feb 2004 Ipswitch IMail LDAP Remote Exploit Source: BID Type: Exploit, Patch, Vendor Advisory 9682 Source: CCN Type: BID-9682 Ipswitch IMail Server Remote LDAP Daemon Buffer Overflow Vulnerability Source: XF Type: UNKNOWN imail-ldap-tag-bo(15243) Source: XF Type: UNKNOWN imail-ldap-tag-bo(15243) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |