First published: Wed Dec 07 2005(Updated: )
Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch Ipswitch Collaboration Suite | =2.0 | |
Ipswitch Ipswitch Collaboration Suite | =2.01 | |
Ipswitch IMail Secure Server | =8.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2931 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2005-2931, update to a patched version of IMail Server or Ipswitch Collaboration Suite that addresses this vulnerability.
CVE-2005-2931 affects Ipswitch Collaboration Suite versions 2.0 and 2.01, as well as IMail Server version 8.20.
Yes, CVE-2005-2931 can be exploited remotely via certain SMTP commands with crafted input.
The commands involved in CVE-2005-2931 include EXPN, MAIL, MAIL FROM, and RCPT TO.