Short Name |
APP:IPSWITCH:IMAIL-FILEDISCLSR |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Ipswitch IMail Web Calendaring Arbitrary File Read |
Release Date |
2012/12/16 |
Update Number |
2211 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a vulnerability in the Ipswitch IMail Web Calendaring. Attackers can read arbitrary files on the Web server.
Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code. The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues.