ID

VAR-200512-0015


CVE

CVE-2005-2923


TITLE

Ipswitch IMail IMAP LIST Command Remote Denial of Service Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200512-106

DESCRIPTION

The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory. Successful exploitation will cause the affected server to crash, effectively denying service to legitimate users. Ipswitch IMail Server is an American Ipswitch company's mail server running on the Microsoft Windows operating system. Ipswitch IMail IMAP List Command DoS Vulnerability iDEFENSE Security Advisory 12.06.05 www.idefense.com/application/poi/display?id=347&type=vulnerabilities December 6, 2005 I. BACKGROUND Ipswitch Imail Server is an email server that is part of the IpSwitch Collaboration suit. Imail Supports POP3, SMTP, IMAP and web based email access. More Information can be located on the vendor\x92s site at: http://www.ipswitch.com/Products/collaboration/index.html II. The problem specifically exists in handling long arguments to the LIST command. When a LIST command of approximately 8000 bytes is supplied, internal string parsing routines can be manipulated in such a way as to reference non-allocated sections of memory. This parsing error results in an unhandled access violation, forcing the daemon to exit. III. The LIST command is only available post authentication and therefore valid credentials are required to exploit this vulnerability. IV. DETECTION iDEFENSE has confirmed the existence of this vulnerability in Ipswitch IMail 8.2. V. WORKAROUND As this vulnerability is exploited after authentication occurs, ensuring that only trusted users have accounts can mitigate the risk somewhat. As a more effective workaround, consider limiting access to the IMAP server by filtering TCP port 143. If possible, consider disabling IMAP and forcing users to use POP3. VI. VENDOR RESPONSE Ipswitch Collaboration Suite 2.02 has been released to address this issue and is available for download at: http://www.ipswitch.com/support/ics/updates/ics202.asp IMail Server 8.22 Patch has been released to address this issue and is available for download at: http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2005-2923 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 09/08/2005 Initial vendor notification 09/13/2005 Initial vendor response 10/06/2005 Coordinated public disclosure IX. CREDIT Sebastian Apelt is credited with discovering this vulnerability. Get paid for vulnerability research http://www.idefense.com/poi/teams/vcp.jsp Free tools, research and upcoming events http://labs.idefense.com X. LEGAL NOTICES Copyright \xa9 2005 iDEFENSE, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDEFENSE. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please email customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . 1) A format string error exists in the SMTPD32 service when parsing arguments supplied to the "expn", "mail", "mail from", and "rcpt to" commands. This can be exploited to execute arbitrary code via specially crafted arguments sent to the affected commands. The vulnerabilities have been reported in IMail Server version 8.20. Other versions prior to 8.22 may also be affected. SOLUTION: Update to the fixed versions. http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp Ipswitch Collaboration Suite 2.0: Update to version 2.02. http://www.ipswitch.com/support/ics/updates/ics202.asp PROVIDED AND/OR DISCOVERED BY: 1) Nico 2) Sebastian Apelt ORIGINAL ADVISORY: http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.44

sources: NVD: CVE-2005-2923 // BID: 15753 // VULHUB: VHN-14132 // PACKETSTORM: 42191 // PACKETSTORM: 42134

AFFECTED PRODUCTS

vendor:ipswitchmodel:collaboration suitescope:eqversion:2.01

Trust: 1.9

vendor:ipswitchmodel:collaboration suitescope:eqversion:2.0

Trust: 1.6

vendor:ipswitchmodel:imail serverscope:eqversion:8.20

Trust: 1.6

vendor:ipswitchmodel:collaboration suitescope: - version: -

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.20

Trust: 0.3

vendor:ipswitchmodel:imailscope:eqversion:8.2

Trust: 0.3

vendor:ipswitchmodel:collaboration suitescope:neversion:2.02

Trust: 0.3

vendor:ipswitchmodel:imailscope:neversion:8.22

Trust: 0.3

vendor:ipswitchmodel:imail hotfixscope:neversion:8.22

Trust: 0.3

sources: BID: 15753 // CNNVD: CNNVD-200512-106 // NVD: CVE-2005-2923

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2923
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200512-106
value: MEDIUM

Trust: 0.6

VULHUB: VHN-14132
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-2923
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14132
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14132 // CNNVD: CNNVD-200512-106 // NVD: CVE-2005-2923

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-14132 // NVD: CVE-2005-2923

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 42191 // CNNVD: CNNVD-200512-106

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200512-106

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-14132

EXTERNAL IDS

db:NVDid:CVE-2005-2923

Trust: 2.1

db:BIDid:15753

Trust: 2.0

db:SECUNIAid:17863

Trust: 1.8

db:SECTRACKid:1015318

Trust: 1.7

db:VUPENid:ADV-2005-2782

Trust: 1.7

db:CNNVDid:CNNVD-200512-106

Trust: 0.7

db:IDEFENSEid:20051206 IPSWITCH IMAIL IMAP LIST COMMAND DOS VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:42191

Trust: 0.2

db:VULHUBid:VHN-14132

Trust: 0.1

db:PACKETSTORMid:42134

Trust: 0.1

sources: VULHUB: VHN-14132 // BID: 15753 // PACKETSTORM: 42191 // PACKETSTORM: 42134 // CNNVD: CNNVD-200512-106 // NVD: CVE-2005-2923

REFERENCES

url:http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities

Trust: 1.8

url:http://www.securityfocus.com/bid/15753

Trust: 1.7

url:http://securitytracker.com/id?1015318

Trust: 1.7

url:http://secunia.com/advisories/17863

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/2782

Trust: 1.1

url:http://www.frsirt.com/english/advisories/2005/2782

Trust: 0.6

url:http://www.idefense.com/intelligence/vulnerabilities/display.php?type=vulnerabilities&id=347

Trust: 0.3

url:http://www.ipswitch.com/products/imail_server/index.asp

Trust: 0.3

url:http://www.ipswitch.com/support/ics/updates/ics202.asp

Trust: 0.2

url:http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp

Trust: 0.2

url:http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2923

Trust: 0.1

url:http://www.idefense.com/poi/teams/vcp.jsp

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.ipswitch.com/products/collaboration/index.html

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://labs.idefense.com

Trust: 0.1

url:http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/3048/

Trust: 0.1

url:http://secunia.com/advisories/17863/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5167/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-14132 // BID: 15753 // PACKETSTORM: 42191 // PACKETSTORM: 42134 // CNNVD: CNNVD-200512-106 // NVD: CVE-2005-2923

CREDITS

Sebastian Apelt

Trust: 0.6

sources: CNNVD: CNNVD-200512-106

SOURCES

db:VULHUBid:VHN-14132
db:BIDid:15753
db:PACKETSTORMid:42191
db:PACKETSTORMid:42134
db:CNNVDid:CNNVD-200512-106
db:NVDid:CVE-2005-2923

LAST UPDATE DATE

2024-08-14T13:50:57.023000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14132date:2011-03-08T00:00:00
db:BIDid:15753date:2009-07-12T17:56:00
db:CNNVDid:CNNVD-200512-106date:2005-12-07T00:00:00
db:NVDid:CVE-2005-2923date:2011-03-08T02:25:17.627

SOURCES RELEASE DATE

db:VULHUBid:VHN-14132date:2005-12-07T00:00:00
db:BIDid:15753date:2005-12-06T00:00:00
db:PACKETSTORMid:42191date:2005-12-09T16:47:24
db:PACKETSTORMid:42134date:2005-12-07T17:36:35
db:CNNVDid:CNNVD-200512-106date:2005-12-06T00:00:00
db:NVDid:CVE-2005-2923date:2005-12-07T01:03:00