ID

VAR-200609-0308


CVE

CVE-2006-4379


TITLE

The Ipswitch IMail Server is vulnerable to a buffer overflow

Trust: 0.8

sources: CERT/CC: VU#542197

DESCRIPTION

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character. The Ipswitch IMail Server is vulnerable to a buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. Authentication is not required to exploit this vulnerability.The specific flaw exists within the SMTP daemon. A lack of bounds checking during the parsing of long strings contained within the characters '@' and ':' leads to a stack overflow vulnerability. Exploitation can result in code execution or a denial of service. Ipswitch IMail Server and Collaboration Suite are prone to a stack-overflow vulnerability. Updates are available. Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure are vulnerable. Ipswitch IMail Server is an American Ipswitch company's mail server running on the Microsoft Windows operating system. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Ipswitch IMail Server SMTP Service Unspecified Vulnerability SECUNIA ADVISORY ID: SA21795 VERIFY ADVISORY: http://secunia.com/advisories/21795/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Ipswitch Collaboration Suite 2006 http://secunia.com/product/8652/ IMail Secure Server 2006 http://secunia.com/product/8651/ IMail Server 2006 http://secunia.com/product/8653/ DESCRIPTION: A vulnerability has been reported in IMail Server, which can be exploited by malicious people to compromise a vulnerable system. ORIGINAL ADVISORY: http://www.ipswitch.com/support/ics/updates/ics20061.asp http://www.ipswitch.com/support/imail/releases/im20061.asp ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ZDI-06-028: Ipswitch Collaboration Suite SMTP Server Stack Overflow http://www.zerodayinitiative.com/advisories/ZDI-06-028.html September 7, 2006 -- CVE ID: CVE-2006-4379 -- Affected Vendor: Ipswitch -- Affected Products: ICS/IMail Server 2006 -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability since August 31, 2006 by Digital Vaccine protection filter ID 4496. -- Vendor Response: Ipswitch has issued an update, version 2006.1, to correct this vulnerability. More details can be found at: http://www.ipswitch.com/support/imail/releases/im20061.asp -- Disclosure Timeline: 2006.06.22 - Vulnerability reported to vendor 2006.08.31 - Digital Vaccine released to TippingPoint customers 2006.09.07 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by an anonymous researcher. -- About the Zero Day Initiative (ZDI): Established by TippingPoint, a division of 3Com, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. 3Com does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, 3Com provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, 3Com provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product

Trust: 3.51

sources: NVD: CVE-2006-4379 // CERT/CC: VU#542197 // JVNDB: JVNDB-2006-002006 // ZDI: ZDI-06-028 // BID: 19885 // VULHUB: VHN-20487 // PACKETSTORM: 49786 // PACKETSTORM: 49828

AFFECTED PRODUCTS

vendor:ipswitchmodel:imail secure serverscope:eqversion:2006

Trust: 2.7

vendor:ipswitchmodel:imail plusscope:eqversion:2006

Trust: 2.4

vendor:ipswitchmodel:collaboration suitescope:eqversion:2006_premium

Trust: 1.6

vendor:ipswitchmodel:collaboration suitescope:eqversion:2006_standard

Trust: 1.6

vendor:ipswitchmodel: - scope: - version: -

Trust: 0.8

vendor:ipswitchmodel:collaboration suitescope:eqversion:2006 suite premium and standard editions

Trust: 0.8

vendor:ipswitchmodel:imailscope: - version: -

Trust: 0.7

vendor:ipswitchmodel:collaboration suite standard editionscope:eqversion:2006

Trust: 0.3

vendor:ipswitchmodel:collaboration suite premium editionscope:eqversion:2006

Trust: 0.3

vendor:ipswitchmodel:imail serverscope:eqversion:2006

Trust: 0.3

vendor:ipswitchmodel:imail plusscope:eqversion:0

Trust: 0.3

vendor:ipswitchmodel:collaboration suite standard editionscope:neversion:2006.1

Trust: 0.3

vendor:ipswitchmodel:collaboration suite premium editionscope:neversion:2006.1

Trust: 0.3

vendor:ipswitchmodel:imail serverscope:neversion:2006.1

Trust: 0.3

sources: CERT/CC: VU#542197 // ZDI: ZDI-06-028 // BID: 19885 // JVNDB: JVNDB-2006-002006 // CNNVD: CNNVD-200609-136 // NVD: CVE-2006-4379

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4379
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#542197
value: 12.86

Trust: 0.8

NVD: CVE-2006-4379
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200609-136
value: HIGH

Trust: 0.6

VULHUB: VHN-20487
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-4379
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-20487
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#542197 // VULHUB: VHN-20487 // JVNDB: JVNDB-2006-002006 // CNNVD: CNNVD-200609-136 // NVD: CVE-2006-4379

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4379

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 49828 // CNNVD: CNNVD-200609-136

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200609-136

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-002006

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-20487

PATCH

title:im20061url:http://www.ipswitch.com/support/imail/releases/im20061.asp

Trust: 1.5

sources: ZDI: ZDI-06-028 // JVNDB: JVNDB-2006-002006

EXTERNAL IDS

db:NVDid:CVE-2006-4379

Trust: 3.6

db:SECUNIAid:21795

Trust: 2.6

db:ZDIid:ZDI-06-028

Trust: 2.5

db:BIDid:19885

Trust: 2.0

db:VUPENid:ADV-2006-3496

Trust: 1.7

db:SECTRACKid:1016803

Trust: 1.7

db:SECTRACKid:1016804

Trust: 1.7

db:CERT/CCid:VU#542197

Trust: 0.8

db:JVNDBid:JVNDB-2006-002006

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-067

Trust: 0.7

db:CNNVDid:CNNVD-200609-136

Trust: 0.7

db:BUGTRAQid:20060907 ZDI-06-028: IPSWITCH COLLABORATION SUITE SMTP SERVER STACK OVERFLOW

Trust: 0.6

db:XFid:28789

Trust: 0.6

db:PACKETSTORMid:49828

Trust: 0.2

db:EXPLOIT-DBid:3264

Trust: 0.1

db:EXPLOIT-DBid:2601

Trust: 0.1

db:EXPLOIT-DBid:3265

Trust: 0.1

db:VULHUBid:VHN-20487

Trust: 0.1

db:PACKETSTORMid:49786

Trust: 0.1

sources: CERT/CC: VU#542197 // ZDI: ZDI-06-028 // VULHUB: VHN-20487 // BID: 19885 // JVNDB: JVNDB-2006-002006 // PACKETSTORM: 49786 // PACKETSTORM: 49828 // CNNVD: CNNVD-200609-136 // NVD: CVE-2006-4379

REFERENCES

url:http://www.ipswitch.com/support/imail/releases/im20061.asp

Trust: 3.4

url:http://www.ipswitch.com/support/ics/updates/ics20061.asp

Trust: 2.6

url:http://www.zerodayinitiative.com/advisories/zdi-06-028.html

Trust: 1.8

url:http://www.securityfocus.com/bid/19885

Trust: 1.7

url:http://securitytracker.com/id?1016803

Trust: 1.7

url:http://securitytracker.com/id?1016804

Trust: 1.7

url:http://secunia.com/advisories/21795

Trust: 1.7

url:http://www.securityfocus.com/archive/1/445521/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3496

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28789

Trust: 1.1

url:http://secunia.com/advisories/21795/

Trust: 0.9

url:http://www.mail-archive.com/imail_forum@list.ipswitch.com/msg108403.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4379

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4379

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/3496

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/28789

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/445521/100/0/threaded

Trust: 0.6

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.1

url:http://secunia.com/product/8653/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/8651/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/8652/

Trust: 0.1

url:http://secunia.com/web_application_security_specialist/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4379

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: CERT/CC: VU#542197 // ZDI: ZDI-06-028 // VULHUB: VHN-20487 // JVNDB: JVNDB-2006-002006 // PACKETSTORM: 49786 // PACKETSTORM: 49828 // CNNVD: CNNVD-200609-136 // NVD: CVE-2006-4379

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-06-028

SOURCES

db:CERT/CCid:VU#542197
db:ZDIid:ZDI-06-028
db:VULHUBid:VHN-20487
db:BIDid:19885
db:JVNDBid:JVNDB-2006-002006
db:PACKETSTORMid:49786
db:PACKETSTORMid:49828
db:CNNVDid:CNNVD-200609-136
db:NVDid:CVE-2006-4379

LAST UPDATE DATE

2024-08-14T15:40:43.942000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#542197date:2006-12-07T00:00:00
db:ZDIid:ZDI-06-028date:2006-09-08T00:00:00
db:VULHUBid:VHN-20487date:2018-10-17T00:00:00
db:BIDid:19885date:2007-02-05T16:18:00
db:JVNDBid:JVNDB-2006-002006date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200609-136date:2006-09-12T00:00:00
db:NVDid:CVE-2006-4379date:2018-10-17T21:36:48.320

SOURCES RELEASE DATE

db:CERT/CCid:VU#542197date:2006-12-07T00:00:00
db:ZDIid:ZDI-06-028date:2006-09-08T00:00:00
db:VULHUBid:VHN-20487date:2006-09-08T00:00:00
db:BIDid:19885date:2006-09-07T00:00:00
db:JVNDBid:JVNDB-2006-002006date:2012-09-25T00:00:00
db:PACKETSTORMid:49786date:2006-09-08T05:23:41
db:PACKETSTORMid:49828date:2006-09-08T06:50:37
db:CNNVDid:CNNVD-200609-136date:2006-09-08T00:00:00
db:NVDid:CVE-2006-4379date:2006-09-08T21:04:00