Lucene search

K
canvasImmunity CanvasIMAIL_RCPTOVERFLOW
HistorySep 08, 2006 - 9:04 p.m.

Immunity Canvas: IMAIL_RCPTOVERFLOW

2006-09-0821:04:00
Immunity Canvas
exploitlist.immunityinc.com
16

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%

Name imail_rcptoverflow
CVE CVE-2006-4379 Exploit Pack
VENDOR: IPSwitch
Post-exploitaion: Post-exploitation requires stoping and starting the IMail SMTP Server Service
From a different process (use injectprocess to get a new listener) runcommand: net stop “IMail SMTP Server”
net start “IMail SMTP Server”
Platforms Tested: Windows 2000 SP4 (English) IMail 8.13

Date public: 2006-09-07
CVE Url: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4379
CVSS: 7.5

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%