Vulnerability Name:

CVE-2005-3526 (CCN-25133)

Assigned:2005-12-31
Published:2005-12-31
Updated:2018-10-19
Summary:Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.
CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Mon Mar 13 2006 - 12:15:23 CST
ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability

Source: MITRE
Type: CNA
CVE-2005-3526

Source: CCN
Type: SA19168
Ipswitch IMail Server/Collaboration Suite IMAP FETCH Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
19168

Source: SREASON
Type: UNKNOWN
577

Source: CCN
Type: SECTRACK ID: 1015759
Ipswitch Collaboration Suite Buffer Overflow in IMAP FETCH Command Lets Remote Authenticated Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1015759

Source: CCN
Type: Ipswitch Collaboration Suite Web site
Ipswitch, Inc. - Ipswitch Collaboration Suite 2006

Source: CCN
Type: IMail Secure Server Web site
Ipswitch, Inc. - IMail Server 2006

Source: CCN
Type: Imail Server Web site
Ipswitch, Inc. - Purchase IMail 2006

Source: CCN
Type: Ipswitch Update Advisory Released March 9, 2006
Ipswitch Collaboration Suite 2006.03 Premium Edition

Source: CONFIRM
Type: UNKNOWN
http://www.ipswitch.com/support/ics/updates/ics200603prem.asp

Source: OSVDB
Type: UNKNOWN
23796

Source: CCN
Type: OSVDB ID: 23796
Ipswitch IMail Server/Collaboration Suite IMAP FETCH Command Overflow

Source: BUGTRAQ
Type: UNKNOWN
20060313 ZDI-06-003: Ipswitch Collaboration Suite Code Execution Vulnerability

Source: BID
Type: UNKNOWN
17063

Source: CCN
Type: BID-17063
Ipswitch IMail Server / Collaboration Suite IMAP FETCH Remote Buffer Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-0907

Source: MISC
Type: Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-003.html

Source: XF
Type: UNKNOWN
ipswitch-imap-fetch-bo(25133)

Source: XF
Type: UNKNOWN
ipswitch-imap-fetch-bo(25133)

Source: CCN
Type: ZDI-06-003
Ipswitch Collaboration Suite Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ipswitch:ipswitch_collaboration_suite:2006.02_premium:*:*:*:*:*:*:*
  • OR cpe:/a:ipswitch:ipswitch_collaboration_suite:2006.02_standard:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ipswitch:imail_server:2006.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ipswitch ipswitch collaboration suite 2006.02_premium
    ipswitch ipswitch collaboration suite 2006.02_standard
    ipswitch imail server 2006.2
    microsoft windows 2003_server