Vulnerability Name: | CVE-2005-3526 (CCN-25133) | ||||||||
Assigned: | 2005-12-31 | ||||||||
Published: | 2005-12-31 | ||||||||
Updated: | 2018-10-19 | ||||||||
Summary: | Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command. | ||||||||
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Mon Mar 13 2006 - 12:15:23 CST ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability Source: MITRE Type: CNA CVE-2005-3526 Source: CCN Type: SA19168 Ipswitch IMail Server/Collaboration Suite IMAP FETCH Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 19168 Source: SREASON Type: UNKNOWN 577 Source: CCN Type: SECTRACK ID: 1015759 Ipswitch Collaboration Suite Buffer Overflow in IMAP FETCH Command Lets Remote Authenticated Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015759 Source: CCN Type: Ipswitch Collaboration Suite Web site Ipswitch, Inc. - Ipswitch Collaboration Suite 2006 Source: CCN Type: IMail Secure Server Web site Ipswitch, Inc. - IMail Server 2006 Source: CCN Type: Imail Server Web site Ipswitch, Inc. - Purchase IMail 2006 Source: CCN Type: Ipswitch Update Advisory Released March 9, 2006 Ipswitch Collaboration Suite 2006.03 Premium Edition Source: CONFIRM Type: UNKNOWN http://www.ipswitch.com/support/ics/updates/ics200603prem.asp Source: OSVDB Type: UNKNOWN 23796 Source: CCN Type: OSVDB ID: 23796 Ipswitch IMail Server/Collaboration Suite IMAP FETCH Command Overflow Source: BUGTRAQ Type: UNKNOWN 20060313 ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability Source: BID Type: UNKNOWN 17063 Source: CCN Type: BID-17063 Ipswitch IMail Server / Collaboration Suite IMAP FETCH Remote Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-0907 Source: MISC Type: Vendor Advisory http://www.zerodayinitiative.com/advisories/ZDI-06-003.html Source: XF Type: UNKNOWN ipswitch-imap-fetch-bo(25133) Source: XF Type: UNKNOWN ipswitch-imap-fetch-bo(25133) Source: CCN Type: ZDI-06-003 Ipswitch Collaboration Suite Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |