Korean
<< Back
VID 22493
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The remote host appears to be running Ipswitch Imail Server older than version 11.02. Such versions are reportedly affected by multiple issues :

- By sending a specially crafted message to imailsrv.exe with multiple 'Reply-To' headers set, it may be possible for a remote unauthenticated attacker to execute arbitrary code on the remote system. (ZDI-10-126)

- By sending a specially crafted message containing '?Q?' operator, it may be possible for a remote authenticated attacker to execute arbitrary code on the remote system with SYSTEM privileges. (ZDI-10-127)

- By sending a specially crafted message with a overly long '-NOTIFY' argument, it may be possible for a remote unauthenticated attacker to execute arbitrary code on the remote system. (ZDI-10-128)


* Note: This check solely relied on the banner of Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.zerodayinitiative.com/advisories/ZDI-10-126/
http://www.zerodayinitiative.com/advisories/ZDI-10-127/
http://www.zerodayinitiative.com/advisories/ZDI-10-128/
http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0231.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0232.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0233.html

* Platforms Affected:
Ipswitch, Inc., IMail Server prior to 11.02
Microsoft Windows Any version
Recommendation Upgrade to the latest version of IMail Server (11.02 or later), available from the Ipswitch Web page at http://www.imailserver.com/support/releases/im1102.asp
Related URL (CVE)
Related URL 41717,41718,41719 (SecurityFocus)
Related URL (ISS)