First published: Wed May 25 2005(Updated: )
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch IMail | =8.13 | |
Ipswitch IMail Secure Server | <=8.2_hotfix_2 | |
Ipswitch Ipswitch Collaboration Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1256 is classified as a high severity vulnerability due to its ability to allow remote authenticated users to execute arbitrary code.
To fix CVE-2005-1256, upgrade to IMail Server version 8.2 Hotfix 2 or later.
CVE-2005-1256 affects users of Ipswitch Collaboration Suite and IMail versions prior to 8.2 Hotfix 2.
CVE-2005-1256 is a stack-based buffer overflow vulnerability.
Yes, CVE-2005-1256 can be exploited remotely by authenticated users through a specially crafted STATUS command.