First published: Wed May 25 2005(Updated: )
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch Ipswitch Collaboration Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1249 is considered a denial of service vulnerability that can lead to significant CPU consumption.
To mitigate CVE-2005-1249, it is recommended to update to a patched version of the Ipswitch Collaboration Suite.
CVE-2005-1249 affects the Ipswitch Collaboration Suite, specifically its IMAP daemon (IMAPD32.EXE).
Yes, CVE-2005-1249 can be exploited remotely by attackers using an LSUB command with a large number of null characters.
CVE-2005-1249 enables a denial of service attack that results in the IMAP daemon entering an infinite loop.