From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 19 Jul 2007 15:07:49 +0200
Subject: [NT] Ipswitch IMail Server 2006 Multiple IMAP Buffer Overflow Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070719125000.131025859@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
Ipswitch IMail Server 2006 Multiple IMAP Buffer Overflow Vulnerabilities
------------------------------------------------------------------------
SUMMARY
<http://ipswitch.com/products/imail/index.asp > Ipswitch Inc.'s IMail
Server is "an e-mail server aimed at providing easily configured and
maintained e-mail services for small organizations". Remote exploitation
of multiple buffer overflow vulnerabilities in Ipswitch Inc.'s IMail
Server 2006 could allow attackers to execute arbitrary code.
DETAILS
Vulnerable Systems:
* IMail Server 2006. The vulnerable executable used was version 6.8.8.1
of imapd32.exe.
IMail includes an IMAP daemon that users can use to access their email.
The "Search" IMAP command contains an exploitable stack-based buffer
overflow vulnerability. Additionally, the "Search charset" contains an
exploitable heap-based buffer overflow vulnerability.
Exploitation allows an attacker to execute arbitrary code with SYSTEM
privileges.
In order to exploit these issues, an attacker would need to login to a
vulnerable IMail IMAP Server using valid credentials.
The vulnerable component is installed with any IPSwitch product that
includes the IMail Server. This includes products such as its
Collaboration Suite packages.
Disabling the IMAP service prevents exploitation of these vulnerabilities.
Consider enabling POP3 or webmail as an alternative to IMAP.
Vendor Status:
Ipswitch Inc. has released version 2006.21 of its IMail product to address
these vulnerabilities. More information can be found at the following URL.
<http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease> http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease
Disclosure Timeline:
* 02/13/2007 - Initial vendor notification
* 07/17/2007 - Initial vendor response
* 07/18/2007 - Coordinated public disclosure
ADDITIONAL INFORMATION
The information has been provided by iDefense.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563>
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.