CVE-2005-1256
Summary
| CVE | CVE-2005-1256 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-05-25 04:00:00 UTC |
| Updated | 2008-11-15 05:46:00 UTC |
| Description | Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ipswitch | Imail | 8.13 | All | All | All |
| Application | Ipswitch | Imail | 8.13 | All | All | All |
| Application | Ipswitch | Imail Server | All | All | All | All |
| Application | Ipswitch | Ipswitch Collaboration Suite | All | All | All | All |
| Application | Ipswitch | Ipswitch Collaboration Suite | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Ipswitch, Inc. - IMail Server Patches & Upgrades | CONFIRM | www.ipswitch.com | Patch |
| Ipswitch IMail Server Multiple Vulnerabilities | BID | www.securityfocus.com | |
| Accenture | Let there be change | IDEFENSE | www.idefense.com | Vendor Advisory |
| SecurityTracker.com Archives - IPswitch IMail Bugs Let Remote Users View Files and Execute Arbitrary Code | SECTRACK | securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.