7.5
CVSSv2

CVE-2006-4379

Published: 08/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote malicious users to execute arbitrary code via a long string located after an '@' character and before a ':' character.

Vulnerable Product Search on Vulmon Subscribe to Product

ipswitch imail plus 2006

ipswitch imail secure server 2006

ipswitch ipswitch collaboration suite 2006_premium

ipswitch ipswitch collaboration suite 2006_standard

Exploits

// IMail 2006 and 8x SMTP Stack Overflow Exploit // coded by Greg Linares [glinarescode[at]gmail[dot]com // wwwjunipernet/security/auto/vulnerabilities/vuln3414html // This works on the following versions: // 2006 IMail prior to 20061 update #include <stdioh> #include <stringh> #include <windowsh> #include <wi ...
#!/usr/bin/perl # wwwzerodayinitiativecom/advisories/ZDI-06-028html # wwwsecurityfocuscom/bid/19885 # # acaro [at] jervusit use IO::Socket::INET; use Switch; if (@ARGV < 3) { print "--------------------------------------------------------------------\n"; print "Usage : Imail-rcpt-overflowpl -hTargetIPAddress -oTargetRetu ...
## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field below In the # case of an unknown or missing license, this file defaults to the same # license as the core Framework (dual GPLv2 and Artistic) The latest # version of the Framework can always be obtained from metas ...