what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 453 RSS Feed

IMAP Files

Xplico Network Forensic Analysis Tool 0.5.5
Posted Feb 23, 2010
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.

Changes: Migrated to SQLite3. Added telnet and web mail dissectors. Various other changes and improvements.
tags | tool, imap, forensics
SHA-256 | 3f591c7a631bafffaada2cfc5a79b9c4684f546ebd662c0ca097208d05d700f4
Stunnel SSL Wrapper 4.31
Posted Feb 4, 2010
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: Log file reloading with SIGUSR1 was added. Some regression issues introduced in the experimental version 4.30 were fixed.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 187d0df2701d51c09b66f120cf6f1a62c4161e3e58dc84f893c1e5c7ccf30262
stunnel-4.30.tar.gz
Posted Feb 4, 2010
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: Configuration can be gracefully reloaded with a HUP signal on Unix and with the GUI on Windows.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | cc544d65aa4d60a0f91e21a6930824ab0588813e3a05c5a9d8020fff47dca841
Mandriva Linux Security Advisory 2009-146
Posted Dec 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-146 - Security vulnerabilities has been identified and fixed in University of Washington IMAP Toolkit.

tags | advisory, vulnerability, imap
systems | linux, mandriva
advisories | CVE-2008-5005, CVE-2008-5006, CVE-2008-5514
SHA-256 | 7d4cf5f5853a965d4cb5684b8a5cd31bb2f6df434ea4e84c2a8c04a5925e5280
Xplico Network Forensic Analysis Tool 0.5.4
Posted Dec 30, 2009
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.

Changes: A Facebook Web chat dissector and WLAN and LLC basic dissectors were added. A new XI based on CakePHP 1.2.5 was added. A new representation of images was implemented. For each image, you can see (with the proxy enabled) the page where the image is contained. There were also HTTP dissector improvements and bugfixes.
tags | tool, imap, forensics
SHA-256 | 73f9b69afe3b7c5c3c1b6f076a540b4124cf95293f3938097d054a9ee9edfbcd
Mandriva Linux Security Advisory 2009-229
Posted Dec 7, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-229 - Buffer overflow in the SIEVE script component (sieve/script.c) in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14 allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, overflow, arbitrary, local, imap
systems | linux, mandriva
advisories | CVE-2009-2632
SHA-256 | e1e2ecde41b24810e22456945dec8bd2d7abdfc74d25908b7cd1437485f3dd8d
Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0). Using the PAYLOAD of windows/shell_bind_tcp allows or the most reliable results.

tags | exploit, overflow, imap
systems | windows
advisories | CVE-2005-4267
SHA-256 | 2e4d189387ba98a5cfc55e1b2069672f8e124842d9a76dd7e47cd00b025cf6ad
Ipswitch IMail IMAP SEARCH Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.

tags | exploit, overflow, imap
advisories | CVE-2007-3925
SHA-256 | 0757ecb74978f93cacdc4418ef7c38cab531545bd9b32a8f39f8239a920240bf
MailEnable IMAPD (2.35) Login Request Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

MailEnable's IMAP server contains a buffer overflow vulnerability in the Login command.

tags | exploit, overflow, imap
advisories | CVE-2006-6423
SHA-256 | a4eceb36c2639afe9fd1c656c7174c4475cb9596985d2e61b7f06f2ea8f79eea
MailEnable IMAPD (1.54) STATUS Request Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code.

tags | exploit, overflow, arbitrary, imap
advisories | CVE-2005-2278
SHA-256 | cf73368ca1456ebf0d123b52f99898904ccc211d943abcf2dbfe856cbeb1c9a1
Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
Posted Nov 26, 2009
Authored by anonymous | Site metasploit.com

This Metasploit module exploits a buffer overflow in the CRAM-MD5 authentication of the MDaemon IMAP service. This vulnerability was discovered by Muts.

tags | exploit, overflow, imap
advisories | CVE-2004-1520
SHA-256 | ab790525ee06e4631621b8a149d2cc10a555ebb52be8f2bcf2739624fa36b789
MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
Posted Nov 26, 2009
Authored by patrick, Jacopo Cervini | Site metasploit.com

This Metasploit module exploits a stack overflow in the Alt-N MDaemon IMAP Server version 9.6.4 by sending an overly long FETCH BODY command. Valid IMAP account credentials are required. Credit to Matteo Memelli

tags | exploit, overflow, imap
advisories | CVE-2008-1358
SHA-256 | e1e88ec1c914159c02c88aa646f73a91ac2acbc316b4991a9d0f98473b227142
Mercur v5.0 IMAP SP3 SELECT Buffer Overflow
Posted Nov 26, 2009
Authored by Jacopo Cervini | Site metasploit.com

Mercur v5.0 IMAP server is prone to a remotely exploitable stack-based buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer. Credit to Tim Taylor for discover the vulnerability.

tags | exploit, overflow, imap
advisories | CVE-2006-1255
SHA-256 | c2b10d51d7fe81041b5773f98702a25cb43650d4819457d1ebaa769257273fc3
Mercur Messaging 2005 IMAP Login Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Atrium Mercur IMAP 5.0 SP3. Since the room for shellcode is small, using the reverse ordinal payloads yields the best results.

tags | exploit, overflow, imap, shellcode
advisories | CVE-2006-1255
SHA-256 | bcc9986727d1a31fd19c6ec9efeca29335e3bac2e984bdb32e707abede16b9c6
Mercury/32 v4.01a IMAP RENAME Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow vulnerability in the Mercury/32 v.4.01a IMAP service.

tags | exploit, overflow, imap
advisories | CVE-2004-1211
SHA-256 | b7ce17f5eebf1671ae2fcf43472ecc4b6c37e626369cda2c8082600012b410af
Novell NetMail <= 3.52d IMAP APPEND Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Novell's Netmail 3.52 IMAP APPEND verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.

tags | exploit, overflow, imap
advisories | CVE-2006-6425
SHA-256 | c2b343f8b2b08c2acbc1a657fc530022dd5ded78e281457e1ff77f70c7f431bb
Novell NetMail <=3.52d IMAP AUTHENTICATE Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Novell's NetMail 3.52 IMAP AUTHENTICATE GSSAPI command. By sending an overly long string, an attacker can overwrite the buffer and control program execution. Using the PAYLOAD of windows/shell_bind_tcp or windows/shell_reverse_tcp allows for the most reliable results.

tags | exploit, overflow, imap
systems | windows
SHA-256 | fd08544af93978e7545fadf71e6021efde4fad0baf16fda963c7559da485984d
Novell NetMail <= 3.52d IMAP STATUS Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Novell's Netmail 3.52 IMAP STATUS verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.

tags | exploit, overflow, imap
advisories | CVE-2005-3314
SHA-256 | 3e62e2b4ee4a08aa484b5f8c28fdd1b562f6f398d8eef098e2954201fb7d15f1
Gentoo Linux Security Advisory 200911-3
Posted Nov 25, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 200911-3 - Multiple vulnerabilities have been found in the UW IMAP toolkit and the c-client library, the worst of which leading to the execution of arbitrary code. Versions less than 2007e are affected.

tags | advisory, arbitrary, vulnerability, imap
systems | linux, gentoo
advisories | CVE-2008-5005, CVE-2008-5006, CVE-2008-5514
SHA-256 | ab9d7e8131f4629b6a10dc3c533fd0fa7d18b4d2ca3137755a0267d4b9021931
Secunia Security Advisory 37487
Posted Nov 25, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for uw-imap and c-client. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, imap
systems | linux, gentoo
SHA-256 | c4775979676fdcd4942cb6e57e14fe6f071ab2787723cee1f7cd8e0e7188bb9b
Stunnel SSL Wrapper 4.28
Posted Nov 17, 2009
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: A serious bug in asynchronous shutdown code was fixed. Win32 DLLs have been added for OpenSSL 0.9.8l. Transparent proxy support was added for Linux kernels versions 2.6.28 and above.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 9be98fb1aa5e96e44095df267d89b776aa539e6dce90dd0d54db675e9a95cd80
Novell NetMail <= 3.52d IMAP SUBSCRIBE Buffer Overflow
Posted Oct 30, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Novell's NetMail 3.52 IMAP SUBSCRIBE verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.

tags | exploit, overflow, imap
advisories | CVE-2006-6761
SHA-256 | 4f3a51860649cb4cf74cf0fc0cb120be7c093bb1528c86e2aeecca4de2ca9ae8
UoW IMAP Server LSUB Buffer Overflow
Posted Oct 27, 2009
Authored by patrick

This Metasploit module exploits a buffer overflow in the 'LSUB' command of the University of Washington IMAP service. This vulnerability can only be exploited with a valid username and password.

tags | exploit, overflow, imap
advisories | CVE-2000-0284
SHA-256 | ed074262b944617dd05f31cfbad7fdb4bc44dbc72e181c6afa6bc59ed9e6d14a
Quiksoft EasyMail 6.0.3.0 IMAP connect() Stack Overflow
Posted Sep 18, 2009
Authored by Sebastian Wolfgarten | Site devtarget.org

Quiksoft EasyMail version 6.0.3.0 suffers from an IMAP related connect() stack overflow vulnerability.

tags | exploit, overflow, imap
SHA-256 | 66991cdd84a9ccc131edc267756ec5e66748a1a775a9804a3050875dd458e065
Debian Linux Security Advisory 1884-1
Posted Sep 15, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1884-1 - Chris Ries discovered that nginx, a high-performance HTTP server, reverse proxy and IMAP/POP3 proxy server, is vulnerable to a buffer underflow when processing certain HTTP requests. An attacker can use this to execute arbitrary code with the rights of the worker process (www-data on Debian) or possibly perform denial of service attacks by repeatedly crashing worker processes via a specially crafted URL in an HTTP request.

tags | advisory, web, denial of service, arbitrary, imap
systems | linux, debian
advisories | CVE-2009-2629
SHA-256 | 1419e6a12847d769f87454f95d9dcca030059bae87b601f27e6e4beb3aa3d9ca
Page 8 of 19
Back678910Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    467 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close