Ipswitch IMail Server/Collaboration Suite IMAP FETCH Command Overflow

2006-03-09T05:47:39
ID OSVDB:23796
Type osvdb
Reporter Manuel Santamarina Suarez(), TippingPoint()
Modified 2006-03-09T05:47:39

Description

Vulnerability Description

A remote overflow exists in Ipswitch IMail Server and Collaboration Suite. The product fails to verify the length of a buffer associated with the FETCH command resulting in a buffer overflow. With a specially crafted command, an attacker can cause the server to crash or possibly execute arbitrary code resulting in a loss of availability or integrity.

Solution Description

Upgrade to version 2006.03 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

A remote overflow exists in Ipswitch IMail Server and Collaboration Suite. The product fails to verify the length of a buffer associated with the FETCH command resulting in a buffer overflow. With a specially crafted command, an attacker can cause the server to crash or possibly execute arbitrary code resulting in a loss of availability or integrity.

References:

Vendor Specific News/Changelog Entry: http://www.ipswitch.com/support/ics/updates/ics200603prem.asp Vendor Specific News/Changelog Entry: http://www.ipswitch.com/support/ics/updates/ics200603stan.asp Vendor Specific News/Changelog Entry: http://www.ipswitch.com/support/imail/releases/imsec200603.asp Vendor Specific News/Changelog Entry: http://www.ipswitch.com/support/imail/releases/im200603.asp Security Tracker: 1015759 Secunia Advisory ID:19168 Other Advisory URL: http://www.zerodayinitiative.com/advisories/ZDI-06-003.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0798.html Keyword: ZDI-06-003 ISS X-Force ID: 25133 CVE-2005-3526