var-200505-1217
Vulnerability from variot
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code. The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Ipswitch IMail server is a Windows-based communication and collaboration solution. There is a remote denial of service vulnerability in the Imail IMAP server of Ipswitch Inc. Attackers can use this vulnerability to cause the target service to crash. The cause of the vulnerability is the handling of extremely long parameters of the SELECT command. If the attacker can provide a string with a length of about 260 bytes, it may trigger a stack overflow and cause the daemon to exit. However, this vulnerability cannot be further exploited
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200505-1217", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "imail", "scope": "eq", "trust": 1.9, "vendor": "ipswitch", "version": "8.13" }, { "model": "imail server", "scope": "lte", "trust": 1.0, "vendor": "ipswitch", "version": "8.2_hotfix_2" }, { "model": "imail server", "scope": "eq", "trust": 0.6, "vendor": "ipswitch", "version": "8.2_hotfix_2" }, { "model": "imail hotfix", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "8.151" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "8.14" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "8.2" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "8.1" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "8.0.5" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "8.0.3" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.12" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.1" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.7" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.6" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.5" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.4" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.3" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.2" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "7.0.1" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.4" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.3" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.2" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.1" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0.6" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0.5" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0.4" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0.3" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0.2" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0.1" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.0" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.0.8" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.0.7" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.0.6" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.0.5" }, { "model": "imail", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.0" }, { "model": "imail hotfix", "scope": "ne", "trust": 0.3, "vendor": "ipswitch", "version": "8.22" } ], "sources": [ { "db": "BID", "id": "13727" }, { "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "db": "NVD", "id": "CVE-2005-1252" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sebastian Apelt", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-1204" } ], "trust": 0.6 }, "cve": "CVE-2005-1252", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2005-1252", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-12461", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-1252", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200505-1204", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-12461", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-12461" }, { "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "db": "NVD", "id": "CVE-2005-1252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via \"..\\\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code. \nThe vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Ipswitch IMail server is a Windows-based communication and collaboration solution. There is a remote denial of service vulnerability in the Imail IMAP server of Ipswitch Inc. Attackers can use this vulnerability to cause the target service to crash. The cause of the vulnerability is the handling of extremely long parameters of the SELECT command. If the attacker can provide a string with a length of about 260 bytes, it may trigger a stack overflow and cause the daemon to exit. However, this vulnerability cannot be further exploited", "sources": [ { "db": "NVD", "id": "CVE-2005-1252" }, { "db": "BID", "id": "13727" }, { "db": "VULHUB", "id": "VHN-12461" } ], "trust": 1.26 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-12461", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-12461" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-1252", "trust": 2.0 }, { "db": "BID", "id": "13727", "trust": 2.0 }, { "db": "SECTRACK", "id": "1014047", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200505-1204", "trust": 0.7 }, { "db": "IDEFENSE", "id": "20050524 IPSWITCH IMAIL WEB CALENDARING ARBITRARY FILE READ VULNERABILITY", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "39313", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-12461", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-12461" }, { "db": "BID", "id": "13727" }, { "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "db": "NVD", "id": "CVE-2005-1252" } ] }, "id": "VAR-200505-1217", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-12461" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:50:01.457000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-1252" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf2.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/13727" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1014047" }, { "trust": 1.6, "url": "http://www.idefense.com/application/poi/display?id=242\u0026type=vulnerabilities" }, { "trust": 0.3, "url": "http://www.ipswitch.com/products/imail_server/index.asp" }, { "trust": 0.3, "url": "/archive/1/400543" }, { "trust": 0.3, "url": "/archive/1/400542" }, { "trust": 0.3, "url": "/archive/1/400546" }, { "trust": 0.3, "url": "/archive/1/400541" }, { "trust": 0.3, "url": "/archive/1/400545" }, { "trust": 0.1, "url": "http://www.idefense.com/application/poi/display?id=242\u0026amp;type=vulnerabilities" } ], "sources": [ { "db": "VULHUB", "id": "VHN-12461" }, { "db": "BID", "id": "13727" }, { "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "db": "NVD", "id": "CVE-2005-1252" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-12461" }, { "db": "BID", "id": "13727" }, { "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "db": "NVD", "id": "CVE-2005-1252" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-05-25T00:00:00", "db": "VULHUB", "id": "VHN-12461" }, { "date": "2005-05-24T00:00:00", "db": "BID", "id": "13727" }, { "date": "2005-05-25T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "date": "2005-05-25T04:00:00", "db": "NVD", "id": "CVE-2005-1252" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-11-15T00:00:00", "db": "VULHUB", "id": "VHN-12461" }, { "date": "2007-04-03T03:12:00", "db": "BID", "id": "13727" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-1204" }, { "date": "2024-11-20T23:56:56.477000", "db": "NVD", "id": "CVE-2005-1252" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-1204" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ipswitch IMail IMAP SELECT Command denial of service vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-1204" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-1204" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.