ID CVE-2005-2931
Summary Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
References
Vulnerable Configurations
  • cpe:2.3:a:ipswitch:imail_server:8.20:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:imail_server:8.20:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.01:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.01:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 08-03-2011 - 02:25)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 15752
confirm http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp
idefense 20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability
sectrack 1015317
secunia 17863
vupen ADV-2005-2782
Last major update 08-03-2011 - 02:25
Published 07-12-2005 - 01:03
Last modified 08-03-2011 - 02:25
Back to Top