Vulnerability Name:

CVE-2007-1637 (CCN-32857)

Assigned:2007-03-05
Published:2007-03-05
Updated:2011-03-08
Summary:Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
Upgrade to version 2006.2.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-1637

Source: IDEFENSE
Type: UNKNOWN
20070307 Ipswitch IMail Server 2006 Multiple ActiveX Control Buffer Overflow Vulnerabilitie

Source: CCN
Type: SA24422
Ipswitch IMail Server/Collaboration Suite IMAILAPI.DLL ActiveX Control Buffer Overflows

Source: SECUNIA
Type: Vendor Advisory
24422

Source: CCN
Type: SECTRACK ID: 1017737
Ipswitch IMail Server Buffer Overflows in ActiveX Controls Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: IPswitch Knowledge Base Article IM-20070305-JH01
IMail/ICS 2006.2 Release Notes

Source: CONFIRM
Type: UNKNOWN
http://support.ipswitch.com/kb/IM-20070305-JH01.htm

Source: CCN
Type: Ipswitch Web site
Network Monitoring, Secure File Transfer, & Messaging - Ipswitch.com

Source: CCN
Type: OSVDB ID: 33648
Ipswitch IMail Server/Collaboration Suite IMailAPI.dll Multiple Remote Overflows

Source: CCN
Type: BID-22852
Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflow Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1017737

Source: VUPEN
Type: UNKNOWN
ADV-2007-0853

Source: XF
Type: UNKNOWN
ipswitch-activex-imail-bo(32857)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 03.07.07
Ipswitch IMail Server2006 Multiple ActiveX Control Buffer Overflow Vulnerabilities

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ipswitch:imail:2006:*:*:*:*:*:*:*
  • OR cpe:/a:ipswitch:imail_plus:2006:*:*:*:*:*:*:*
  • OR cpe:/a:ipswitch:imail_premium:2006:*:*:*:*:*:*:*
  • OR cpe:/a:ipswitch:ipswitch_collaboration_suite:2006_standard:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ipswitch:imail_server:2006.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ipswitch imail 2006
    ipswitch imail plus 2006
    ipswitch imail premium 2006
    ipswitch ipswitch collaboration suite 2006_standard
    ipswitch imail server 2006.2