|
|||
Rule General Information |
---|
Release Date: | 2017-03-09 | |
Rule Name: | PROTOCOL-IMAP Ipswitch Imail IMAP FETCH Command Buffer Overflow Vulnerability (CVE-2005-3526) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:17063 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imailsecure200603.exe ftp://ftp.ipswitch.com/Ipswitch/Product_Support/ICS/ics-premium200603.exe ftp://ftp.ipswitch.com/Ipswitch/Product_Support/ICS/ics-standard200603.exe |