Vulnerability Name: | CVE-2005-1255 (CCN-20716) | ||||||||
Assigned: | 2005-05-24 | ||||||||
Published: | 2005-05-24 | ||||||||
Updated: | 2008-11-15 | ||||||||
Summary: | Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Ipswitch FTP Product Support Web page IMail Source: MITRE Type: CNA CVE-2005-1255 Source: CCN Type: SECTRACK ID: 1014047 IPswitch IMail Bugs Let Remote Users View Files and Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1014047 Source: CCN Type: iDEFENSE Security Advisory 05.24.05 Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities Source: IDEFENSE Type: Vendor Advisory 20050524 Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities Source: CCN Type: Ipswitch Web site Welcome to Ipswitch Source: CCN Type: Ipswitch IMail Server 8.15 Hotfix 2 Support Source: CCN Type: Ipswitch IMail Server 8.2 Hotfix 2 Support Source: CONFIRM Type: Patch http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html Source: BID Type: UNKNOWN 13727 Source: CCN Type: BID-13727 Ipswitch IMail Server Multiple Vulnerabilities Source: XF Type: UNKNOWN imail-login-bo(20716) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
Vulnerability Name: | CVE-2005-1255 (CCN-20718) | ||||||||
Assigned: | 2005-05-24 | ||||||||
Published: | 2005-05-24 | ||||||||
Updated: | 2005-05-24 | ||||||||
Summary: | Ipswitch IMail Server is vulnerable to a stack-based buffer overflow in the handling of the LOGIN command username argument. By specifying a large username beginning with one of several special characters (including %, :, *, @, and &), a remote attacker could overflow the buffer and execute arbitrary code on the system with SYSTEM level privileges. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
6.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Ipswitch FTP Product Support Web page IMail Source: MITRE Type: CNA CVE-2005-1255 Source: CCN Type: SECTRACK ID: 1014047 IPswitch IMail Bugs Let Remote Users View Files and Execute Arbitrary Code Source: CCN Type: iDEFENSE Security Advisory 05.24.05 Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities Source: CCN Type: Ipswitch Web site Welcome to Ipswitch Source: CCN Type: Ipswitch IMail Server 8.15 Hotfix 2 Support Source: CCN Type: Ipswitch IMail Server 8.2 Hotfix 2 Support Source: CCN Type: BID-13727 Ipswitch IMail Server Multiple Vulnerabilities Source: XF Type: UNKNOWN imail-login-username-bo(20718) | ||||||||
BACK |