The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Ipswitch IMail Server 2006 Multiple IMAP Buffer Overflow Vulnerabilities


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 19 Jul 2007 15:07:49 +0200
Subject: [NT] Ipswitch IMail Server 2006 Multiple IMAP Buffer Overflow Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070719125000.131025859@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Ipswitch IMail Server 2006 Multiple IMAP Buffer Overflow Vulnerabilities
------------------------------------------------------------------------


SUMMARY

 <http://ipswitch.com/products/imail/index.asp > Ipswitch Inc.'s IMail 
Server is "an e-mail server aimed at providing easily configured and 
maintained e-mail services for small organizations". Remote exploitation 
of multiple buffer overflow vulnerabilities in Ipswitch Inc.'s IMail 
Server 2006 could allow attackers to execute arbitrary code.

DETAILS

Vulnerable Systems:
 * IMail Server 2006. The vulnerable executable used was version 6.8.8.1 
of imapd32.exe.

IMail includes an IMAP daemon that users can use to access their email. 
The "Search" IMAP command contains an exploitable stack-based buffer 
overflow vulnerability. Additionally, the "Search charset" contains an 
exploitable heap-based buffer overflow vulnerability.

Exploitation allows an attacker to execute arbitrary code with SYSTEM 
privileges.

In order to exploit these issues, an attacker would need to login to a 
vulnerable IMail IMAP Server using valid credentials.

The vulnerable component is installed with any IPSwitch product that 
includes the IMail Server. This includes products such as its 
Collaboration Suite packages.

Disabling the IMAP service prevents exploitation of these vulnerabilities. 
Consider enabling POP3 or webmail as an alternative to IMAP.

Vendor Status:
Ipswitch Inc. has released version 2006.21 of its IMail product to address 
these vulnerabilities. More information can be found at the following URL.
 
<http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease> http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease

Disclosure Timeline:
 * 02/13/2007 - Initial vendor notification
 * 07/17/2007 - Initial vendor response
 * 07/18/2007 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense.
The original article can be found at:
 
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563>; 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру