Short Name |
IMAP:IPSWITCH:SEARCH-DATE |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
IMAP |
Keywords |
Ipswitch IMail Server IMAP SEARCH Command Date String Stack Overflow |
Release Date |
2010/10/13 |
Update Number |
1791 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known a buffer overflow vulnerability in the way Ipswitch IMail Server handles IMAP requests. It is due to lack of boundary protection while processing IMAP SEARCH command. A remote authenticated attacker can exploit this to cause a denial-of-service condition or inject and execute arbitrary code on the system within the security context of the affected service, normally System. In a successful code injection attack, the behavior of the target is entirely dependent on the intended function of the injected code. It would execute within the security context of the affected service, normally System. In an unsuccessful code injection attack the affected server terminates and reset all established connection.
Ipswitch IMail Server is prone to multiple buffer-overflow vulnerabilities because the software fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer. Successful attacks allow arbitrary code to run, facilitating the remote compromise of affected computers. Exploit attempts may also cause the application to crash. Ipswitch IMail Server 2006 is vulnerable to these issues; other versions may also be affected.