First published: Wed May 25 2005(Updated: )
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch Ipswitch Collaboration Suite | ||
Ipswitch IMail | =8.12 | |
Ipswitch IMail | =8.13 | |
Ipswitch IMail Secure Server | <=8.2_hotfix_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1255 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2005-1255, update the IMail server to version 8.2 Hotfix 2 or later.
CVE-2005-1255 affects IMail versions 8.12 and 8.13, as well as the Ipswitch Collaboration Suite versions before IMail Server 8.2 Hotfix 2.
Yes, CVE-2005-1255 can be exploited remotely through crafted LOGIN commands.
CVE-2005-1255 allows attackers to execute arbitrary code on vulnerable systems through stack-based buffer overflows.