Secunia Security Advisory - Two vulnerabilities have been reported in IMail Server, which can be exploited by malicious users to cause a DoS (Denial of Service) and to compromise a vulnerable system.
a73f3cbd5c4330653e03c1d10492a901f50581bca86fa08ac7cf4021eac73781
TITLE:
Ipswitch IMail Server IMAP and SMTP Service Two Vulnerabilities
SECUNIA ADVISORY ID:
SA17863
VERIFY ADVISORY:
http://secunia.com/advisories/17863/
CRITICAL:
Highly critical
IMPACT:
DoS, System access
WHERE:
>From remote
SOFTWARE:
Ipswitch Collaboration Suite (ICS) 2.x
http://secunia.com/product/5167/
IMail Server 8.x
http://secunia.com/product/3048/
DESCRIPTION:
Two vulnerabilities have been reported in IMail Server, which can be
exploited by malicious users to cause a DoS (Denial of Service) and
to compromise a vulnerable system.
1) A format string error exists in the SMTPD32 service when parsing
arguments supplied to the "expn", "mail", "mail from", and "rcpt to"
commands. This can be exploited to execute arbitrary code via
specially crafted arguments sent to the affected commands.
2) An error exists in the IMAP4D32 service when handling user
supplied arguments passed to the IMAP LIST command. This can be
exploited by a logon user to cause a memory dereferencing error,
which crashes the IMAP service by supplying an argument of
approximately 8000 bytes to the command.
The vulnerabilities have been reported in IMail Server version 8.20.
Other versions prior to 8.22 may also be affected.
Note: IMail Server is included as part of the Ipswitch Collaboration
Suite.
SOLUTION:
Update to the fixed versions.
IMail Server 8.20:
Update to version 8.22.
http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp
Ipswitch Collaboration Suite 2.0:
Update to version 2.02.
http://www.ipswitch.com/support/ics/updates/ics202.asp
PROVIDED AND/OR DISCOVERED BY:
1) Nico
2) Sebastian Apelt
ORIGINAL ADVISORY:
http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------