Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.10994
Kategorie:SMTP problems
Titel:IPSwitch IMail SMTP Buffer Overflow
Zusammenfassung:A vulnerability exists within IMail that allows remote attackers to gain SYSTEM level; access to servers running IMail's SMTP daemon (versions 6.06 and below).
Beschreibung:Summary:
A vulnerability exists within IMail that allows remote attackers to gain SYSTEM level
access to servers running IMail's SMTP daemon (versions 6.06 and below).

Vulnerability Insight:
The vulnerability stems from the IMail SMTP daemon not doing proper bounds checking on
various input data that gets passed to the IMail Mailing List handler code.

Vulnerability Impact:
If an attacker crafts a special buffer and sends it to a remote IMail SMTP server
it is possible that an attacker can remotely execute code (commands) on the IMail system.

Solution:
Download the latest patch from the linked references.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: BugTraq ID: 2083
BugTraq ID: 2651
Common Vulnerability Exposure (CVE) ID: CVE-2001-0039
http://www.securityfocus.com/bid/2083
Bugtraq: 20001206 DoS by SMTP AUTH command in IPSwitch IMail server (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html
XForce ISS Database: imail-smtp-auth-dos(5674)
https://exchange.xforce.ibmcloud.com/vulnerabilities/5674
Common Vulnerability Exposure (CVE) ID: CVE-2001-0494
Bugtraq: 20010424 IPSwitch IMail 6.06 SMTP Remote System Access Vulnerability (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html
http://www.osvdb.org/5610
XForce ISS Database: ipswitch-imail-smtp-bo(6445)
https://exchange.xforce.ibmcloud.com/vulnerabilities/6445
CopyrightThis script is Copyright (C) 2002 Digital Defense, Inc.

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.