|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> Ipswitch Collaboration Suite / IMail SMTPD Format String Vulnerability Vulnerability Assessment Details
|
Ipswitch Collaboration Suite / IMail SMTPD Format String Vulnerability |
||
Checks for format string vulnerability in Ipswitch Collaboration Suite / IMail SMTPD Detailed Explanation for this Vulnerability Assessment Summary : The remote SMTP server is affected by a format string vulnerability. Description : The remote host is running Ipswitch Collaboration Suite or IMail Server, commercial messaging and collaboration suites for Windows. The version of Ipswitch Collaboration Suite / IMail server installed on the remote host contains an SMTP server that suffers from a format string flaw. By supplying a specially formatted argument to the 'EXPN', 'MAIL', 'MAIL FROM', or 'RCPT TO' commands, a remote attacker may be able to corrupt memory on the affected host, crash the service, or even execute arbitrary code remotely. See also : http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities http://www.ipswitch.com/support/ics/updates/ics202.asp http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp Solution : Upgrade to Ipswitch Collaboration Suite 2.02 / IMail 8.22 or later. Network Security Threat Level: High / CVSS Base Score : 7.0 (AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:I) Networks Security ID: 15752 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |