Short Name |
IMAP:IPSWITCH:CHAR-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
IMAP |
Keywords |
Ipswitch IMail LOGIN Special Character Buffer Overflow |
Release Date |
2005/06/01 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against the Ipswitch IMail IMAP server. The IMail Server does not perform sufficient boundary checking when processing the LOGIN command. By sending a specialty crafted LOGIN command with a username argument that is overly long and contains special characters, remote attackers can overflow a stack buffer and execute arbitrary code on a vulnerable host with System level privileges.
Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code. The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues.