9
CVSSv2

CVE-2007-2795

Published: 27/01/2009 Updated: 28/01/2009
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 905
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Ipswitch IMail prior to 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.

Vulnerable Product Search on Vulmon Subscribe to Product

ipswitch imail

ipswitch imail 2006.1

Exploits

/* Ipsbitchcpp vs Ipswitch IMAP * Tested on: Windows 2000 SP4 * Ref: CVE-2007-2795 * * Author: Dominic Chell <dmc@deadbeefcouk> * Found this half written on a VM so decided to finish it * * Payload adds a local admin account USER=r00t PASS=r00tr00t!! * */ #include "stdafxh" #include <stdioh> #include <stdlibh> #i ...
IPSwitch IMAP Server version 920 and below remote buffer overflow exploit ...