VID |
22493 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The remote host appears to be running Ipswitch Imail Server older than version 11.02. Such versions are reportedly affected by multiple issues :
- By sending a specially crafted message to imailsrv.exe with multiple 'Reply-To' headers set, it may be possible for a remote unauthenticated attacker to execute arbitrary code on the remote system. (ZDI-10-126)
- By sending a specially crafted message containing '?Q?' operator, it may be possible for a remote authenticated attacker to execute arbitrary code on the remote system with SYSTEM privileges. (ZDI-10-127)
- By sending a specially crafted message with a overly long '-NOTIFY' argument, it may be possible for a remote unauthenticated attacker to execute arbitrary code on the remote system. (ZDI-10-128)
* Note: This check solely relied on the banner of Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.zerodayinitiative.com/advisories/ZDI-10-126/ http://www.zerodayinitiative.com/advisories/ZDI-10-127/ http://www.zerodayinitiative.com/advisories/ZDI-10-128/ http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0231.html http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0232.html http://archives.neohapsis.com/archives/fulldisclosure/2010-07/0233.html
* Platforms Affected: Ipswitch, Inc., IMail Server prior to 11.02 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of IMail Server (11.02 or later), available from the Ipswitch Web page at http://www.imailserver.com/support/releases/im1102.asp |
Related URL |
(CVE) |
Related URL |
41717,41718,41719 (SecurityFocus) |
Related URL |
(ISS) |
|