var-200505-0076
Vulnerability from variot

Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command. The Ipswitch Collaboration Suite IMail IMAP service is reported prone to a buffer overflow vulnerability. The issue exists due to a lack of sufficient boundary checks performed on arguments that are passed to the EXAMINE command. It is conjectured that a remote authenticated attacker may exploit this vulnerability to execute arbitrary code in the context of the affected service. Immediate consequences of a failed exploit attempt would be a denial of service due to the application crashing on an access violation. IMail Server version 8.13 an earlier are reported prone to this vulnerability.


Monitor, Filter, and Manage Security Information - Filtering and Management of Secunia advisories - Overview, documentation, and detailed reports - Alerting via email and SMS

Request Trial: https://ca.secunia.com/?f=l


TITLE: Ipswitch Collaboration Suite IMAP EXAMINE Buffer Overflow

SECUNIA ADVISORY ID: SA14546

VERIFY ADVISORY: http://secunia.com/advisories/14546/

CRITICAL: Moderately critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: Ipswitch Collaboration Suite (ICS) 1.x http://secunia.com/product/4773/ IMail Server 8.x http://secunia.com/product/3048/

DESCRIPTION: Nico Steinhardt has reported a vulnerability in Ipswitch Collaboration Suite, which can be exploited by malicious users to compromise a vulnerable system.

SOLUTION: Apply IMail Server 8.15 Hotfix 1: ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/IM815HF1.exe

PROVIDED AND/OR DISCOVERED BY: Nico Steinhardt

ORIGINAL ADVISORY: iDEFENSE: http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. BACKGROUND

Ipswitch Collaboration Suite (ICS) is a comprehensive communication and collaboration solution for Microsoft Windows with a customer base of over 53 million users. More information is available on the vendor's website:

 http://www.ipswitch.com/products/IMail_Server/index.html

II. The EXAMINE command selects a mailbox so that messages within the mailbox may be accessed with read-only privileges. EXAMINE requests with malformed mailbox names of 259 bytes will overwrite the saved stack frame pointer, resulting in potential process execution control. It should be noted that IMAP will append a '/' character to your supplied mailbox name so the most significant byte of the frame pointer will be 0x2e. The output below shows successful control of the frame pointer.

(668.f8): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled.

eax=00000006 ebx=008943b0 ecx=42424242 edx=00c8fad4 esi=008943b0 edi=00000013 eip=0078626d esp=00c9fd20 ebp=2e434343 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 0078626d ?? ???

Frame pointer overwrites may allow attackers to redirect program flow when the current function returns. It should be noted that the IMAP EXAMINE command is only available after successful authentication.

III. The EXAMINE IMAP command is only valid after authentication has occurred, however due to the nature of IMAP servers serving a large user base, this requirement only slightly reduces exposure to the vulnerability.

IV. DETECTION

iDEFENSE has confirmed that the IMAP4 daemon (IMAP4d32.exe ver. IMail Server is now packaged as part of Ipswitch Collaboration Suite.

V. WORKAROUND

Use application level content filtering on overly long IMAP commands.

VI. VENDOR RESPONSE

This vulnerability is addressed in IMail Server 8.15 Hotfix 1 (February 3, 2005), which is available for download at:

ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/IM815HF1.exe

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2005-0707 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

03/02/2005 Initial vendor notification 03/08/2005 Initial vendor response 03/10/2005 Public disclosure

IX. CREDIT

Nico Steinhardt is credited with this discovery.

Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp

Free tools, research and upcoming events http://labs.idefense.com

X. LEGAL NOTICES

Copyright (c) 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0076",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "collaboration suite",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ipswitch",
        "version": "8.15"
      },
      {
        "model": "collaboration suite",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ipswitch",
        "version": "8.15"
      },
      {
        "model": "collaboration suite",
        "scope": null,
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": null
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.14"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.13"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.1"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.0.5"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.0.3"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.12"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.1"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.7"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.6"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.5"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.4"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.3"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.2"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "7.0.1"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.4"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.3"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.2"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.1"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0.6"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0.5"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0.4"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0.3"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0.2"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0.1"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "6.0"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "5.0.8"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "5.0.7"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "5.0.6"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "5.0.5"
      },
      {
        "model": "imail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "5.0"
      },
      {
        "model": "imail hotfix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "8.151"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12780"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nico Steinhardt iDEFENSE Security Advisory\u203b labs@idefense.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-0707",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2005-0707",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-11916",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2005-0707",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-692",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-11916",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command. The Ipswitch Collaboration Suite IMail IMAP service is reported prone to a buffer overflow vulnerability. The issue exists due to a lack of sufficient boundary checks performed on arguments that are passed to the EXAMINE command. \nIt is conjectured that a remote authenticated attacker may exploit this vulnerability to execute arbitrary code in the context of the affected service. Immediate consequences of a failed exploit attempt would be a denial of service due to the application crashing on an access violation. \nIMail Server version 8.13 an earlier are reported prone to this vulnerability. \n----------------------------------------------------------------------\n\nMonitor, Filter, and Manage Security Information\n- Filtering and Management of Secunia advisories\n- Overview, documentation, and detailed reports\n- Alerting via email and SMS\n\nRequest Trial:\nhttps://ca.secunia.com/?f=l\n\n----------------------------------------------------------------------\n\nTITLE:\nIpswitch Collaboration Suite IMAP EXAMINE Buffer Overflow\n\nSECUNIA ADVISORY ID:\nSA14546\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/14546/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nIpswitch Collaboration Suite (ICS) 1.x\nhttp://secunia.com/product/4773/\nIMail Server 8.x\nhttp://secunia.com/product/3048/\n\nDESCRIPTION:\nNico Steinhardt has reported a vulnerability in Ipswitch\nCollaboration Suite, which can be exploited by malicious users to\ncompromise a vulnerable system. \n\nSOLUTION:\nApply IMail Server 8.15 Hotfix 1:\nftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/IM815HF1.exe\n\nPROVIDED AND/OR DISCOVERED BY:\nNico Steinhardt\n\nORIGINAL ADVISORY:\niDEFENSE:\nhttp://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. BACKGROUND\n\nIpswitch Collaboration Suite (ICS) is a comprehensive communication and \ncollaboration solution for Microsoft Windows with a customer base of \nover 53 million users. More information is available on the vendor\u0027s \nwebsite:\n\n     http://www.ipswitch.com/products/IMail_Server/index.html\n\nII. The \nEXAMINE command selects a mailbox so that messages within the mailbox \nmay be accessed with read-only privileges. EXAMINE requests with \nmalformed mailbox names of 259 bytes will overwrite the saved stack \nframe pointer, resulting in potential process execution control. It \nshould be noted that IMAP will append a \u0027/\u0027 character to your supplied \nmailbox name so the most significant byte of the frame pointer will be \n0x2e. The output below shows successful control of the frame pointer. \n\n(668.f8): Access violation - code c0000005 (first chance)\nFirst chance exceptions are reported before any exception handling. \nThis exception may be expected and handled. \n\neax=00000006 ebx=008943b0 ecx=42424242\nedx=00c8fad4 esi=008943b0 edi=00000013\neip=0078626d esp=00c9fd20 ebp=2e434343\niopl=0         nv up ei pl zr na po nc\ncs=001b ss=0023 ds=0023 es=0023\nfs=0038 gs=0000 efl=00000246\n0078626d ??               ???\n\nFrame pointer overwrites may allow attackers to redirect program flow \nwhen the current function returns. It should be noted that the IMAP \nEXAMINE command is only available after successful authentication. \n\nIII. The EXAMINE IMAP command is only \nvalid after authentication has occurred, however due to the nature of \nIMAP servers serving a large user base, this requirement only slightly \nreduces exposure to the vulnerability. \n\nIV. DETECTION\n\niDEFENSE has confirmed that the IMAP4 daemon (IMAP4d32.exe ver. \nIMail Server is now packaged as part of Ipswitch Collaboration Suite. \n \nV. WORKAROUND\n\nUse application level content filtering on overly long IMAP commands. \n\nVI. VENDOR RESPONSE\n\nThis vulnerability is addressed in IMail Server 8.15 Hotfix 1 (February\n3, 2005), which is available for download at:\n\n   ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/IM815HF1.exe\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CAN-2005-0707 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n03/02/2005  Initial vendor notification\n03/08/2005  Initial vendor response\n03/10/2005  Public disclosure\n\nIX. CREDIT\n\nNico Steinhardt is credited with this discovery. \n\nGet paid for vulnerability research\nhttp://www.idefense.com/poi/teams/vcp.jsp\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com\n\nX. LEGAL NOTICES\n\nCopyright (c) 2005 iDEFENSE, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDEFENSE. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically, please\nemail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \nThere are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct, indirect,\nor consequential loss or damage arising from use of, or reliance on,\nthis information",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      },
      {
        "db": "BID",
        "id": "12780"
      },
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "db": "PACKETSTORM",
        "id": "36576"
      },
      {
        "db": "PACKETSTORM",
        "id": "36591"
      }
    ],
    "trust": 1.44
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-11916",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-0707",
        "trust": 2.1
      },
      {
        "db": "BID",
        "id": "12780",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "14546",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1013410",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692",
        "trust": 0.7
      },
      {
        "db": "IDEFENSE",
        "id": "20050310 IPSWITCH COLLABORATION SUITE IMAP EXAMINE BUFFER OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "19655",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "36591",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-11916",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "36576",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "db": "BID",
        "id": "12780"
      },
      {
        "db": "PACKETSTORM",
        "id": "36576"
      },
      {
        "db": "PACKETSTORM",
        "id": "36591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "id": "VAR-200505-0076",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T23:10:42.490000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "http://www.idefense.com/application/poi/display?id=216\u0026type=vulnerabilities"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/12780"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1013410"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/14546"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19655"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/19655"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/392871"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/application/poi/display?id=216\u0026amp;type=vulnerabilities"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/3048/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/14546/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4773/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?f=l"
      },
      {
        "trust": 0.1,
        "url": "http://www.idefense.com/poi/teams/vcp.jsp"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0707"
      },
      {
        "trust": 0.1,
        "url": "http://www.ipswitch.com/products/imail_server/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org),"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "db": "BID",
        "id": "12780"
      },
      {
        "db": "PACKETSTORM",
        "id": "36576"
      },
      {
        "db": "PACKETSTORM",
        "id": "36591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "db": "BID",
        "id": "12780"
      },
      {
        "db": "PACKETSTORM",
        "id": "36576"
      },
      {
        "db": "PACKETSTORM",
        "id": "36591"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-05-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "date": "2005-03-10T00:00:00",
        "db": "BID",
        "id": "12780"
      },
      {
        "date": "2005-03-15T07:30:59",
        "db": "PACKETSTORM",
        "id": "36576"
      },
      {
        "date": "2005-03-15T07:43:28",
        "db": "PACKETSTORM",
        "id": "36591"
      },
      {
        "date": "2005-03-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-11916"
      },
      {
        "date": "2009-07-12T10:56:00",
        "db": "BID",
        "id": "12780"
      },
      {
        "date": "2006-08-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      },
      {
        "date": "2024-11-20T23:55:44.593000",
        "db": "NVD",
        "id": "CVE-2005-0707"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ipswitch Collaboration Suite IMAP EXAMINE Command buffer overflow vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-692"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…