TITLE: Ipswitch IMail Server IMAP and SMTP Service Two Vulnerabilities SECUNIA ADVISORY ID: SA17863 VERIFY ADVISORY: http://secunia.com/advisories/17863/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Ipswitch Collaboration Suite (ICS) 2.x http://secunia.com/product/5167/ IMail Server 8.x http://secunia.com/product/3048/ DESCRIPTION: Two vulnerabilities have been reported in IMail Server, which can be exploited by malicious users to cause a DoS (Denial of Service) and to compromise a vulnerable system. 1) A format string error exists in the SMTPD32 service when parsing arguments supplied to the "expn", "mail", "mail from", and "rcpt to" commands. This can be exploited to execute arbitrary code via specially crafted arguments sent to the affected commands. 2) An error exists in the IMAP4D32 service when handling user supplied arguments passed to the IMAP LIST command. This can be exploited by a logon user to cause a memory dereferencing error, which crashes the IMAP service by supplying an argument of approximately 8000 bytes to the command. The vulnerabilities have been reported in IMail Server version 8.20. Other versions prior to 8.22 may also be affected. Note: IMail Server is included as part of the Ipswitch Collaboration Suite. SOLUTION: Update to the fixed versions. IMail Server 8.20: Update to version 8.22. http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp Ipswitch Collaboration Suite 2.0: Update to version 2.02. http://www.ipswitch.com/support/ics/updates/ics202.asp PROVIDED AND/OR DISCOVERED BY: 1) Nico 2) Sebastian Apelt ORIGINAL ADVISORY: http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------