Check Point Advisories

Preemptive Protection against Ipswitch IMail Server IMAP SEARCH Command Buffer Overflow Vulnerability

Check Point Reference: CPAI-2007-090
Date Published: 31 Jul 2007
Severity: High
Last Updated: Sunday 03 August, 2008
Source: Secunia Advisory: SA26123
Industry Reference:CVE-2007-2795
Protection Provided by:
Who is Vulnerable? Ipswitch IMail 2006 prior to 2006.21
Ipswitch IMail Plus 2006 prior to 2006.21
Ipswitch IMail Premium 2006 prior to 2006.21
Vulnerability Description A buffer overflow vulnerability exists in Ipswitch IMail Server IMAP component. Ipswitch IMail server is a messaging service suite that supports numerous mail exchanging protocols, including the Internet Message Access Protocol (IMAP). IMAP is a standard protocol for accessing e-mail from a local server that provides management of received messages on a remote server. Several mail servers contain buffer overflow errors in the way they handle commands. A remote attacker can exploit this issue to trigger a buffer overflow which may lead to an application crash and to arbitrary code execution.
Vulnerability DetailsThe vulnerability is due to a boundary error when processing malformed IMAP SEARCH commands. A remote attacker can exploit this flaw via a specially crafted SEARCH command. Successful exploitation may allow an attacker to create a denial of service condition or execute arbitrary code on an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK