Описание
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
Ссылки
- Vendor Advisory
- Patch
- Vendor Advisory
- Patch
Уязвимые конфигурации
Конфигурация 1Версия до 8.2_hotfix_2 (включая)
Одно из
cpe:2.3:a:ipswitch:imail:8.12:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail:8.13:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06301
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character.
EPSS
Процентиль: 91%
0.06301
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other