{"api_version":"1","generated_at":"2026-04-23T18:34:46+00:00","cve":"CVE-2005-2931","urls":{"html":"https://cve.report/CVE-2005-2931","api":"https://cve.report/api/cve/CVE-2005-2931.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-2931","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-2931"},"summary":{"title":"CVE-2005-2931","description":"Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-12-07 01:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities","name":"http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Public Advisory: 12.06.05 // iDefense Labs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1015317","name":"http://securitytracker.com/id?1015317","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ipswitch Collaboration Suite SMTP Command Format String Bug Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/15752","name":"http://www.securityfocus.com/bid/15752","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ipswitch Collaboration Suite and IMail Server SMTPD Remote Format String Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp","name":"http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Ipswitch, Inc. - IMail Server Patches & Upgrades","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17863","name":"http://secunia.com/advisories/17863","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Ipswitch IMail Server IMAP and SMTP Service Two Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2005/2782","name":"http://www.vupen.com/english/advisories/2005/2782","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-2931","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2931","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"2931","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"imail_server","cpe6":"8.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2931","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"ipswitch_collaboration_suite","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2931","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"ipswitch_collaboration_suite","cpe6":"2.01","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T22:53:29.797Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE","x_transferred"],"url":"http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities"},{"name":"1015317","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015317"},{"name":"17863","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17863"},{"name":"ADV-2005-2782","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2782"},{"name":"15752","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15752"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-12-05T00:00:00.000Z","descriptions":[{"lang":"en","value":"Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2005-12-09T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE"],"url":"http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities"},{"name":"1015317","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015317"},{"name":"17863","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17863"},{"name":"ADV-2005-2782","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2782"},{"name":"15752","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15752"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-2931","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20051206 Ipswitch Collaboration Suite SMTP Format String Vulnerability","refsource":"IDEFENSE","url":"http://www.idefense.com/application/poi/display?id=346&type=vulnerabilities"},{"name":"1015317","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015317"},{"name":"17863","refsource":"SECUNIA","url":"http://secunia.com/advisories/17863"},{"name":"ADV-2005-2782","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2782"},{"name":"15752","refsource":"BID","url":"http://www.securityfocus.com/bid/15752"},{"name":"http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp","refsource":"CONFIRM","url":"http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-2931","datePublished":"2005-12-07T01:00:00.000Z","dateReserved":"2005-09-15T00:00:00.000Z","dateUpdated":"2024-08-07T22:53:29.797Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-12-07 01:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail_server:8.20:*:*:*:*:*:*:*","matchCriteriaId":"188ADF5A-00A4-4608-A9F9-EDF61CEFAA20"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DEC4E630-46A4-4C8F-9D73-F8B7241F4795"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2.01:*:*:*:*:*:*:*","matchCriteriaId":"59B7AA85-5A6A-4D40-8ACA-26A6C2FBDACC"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"2931","Ordinal":"1","Title":"CVE-2005-2931","CVE":"CVE-2005-2931","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"2931","Ordinal":"1","NoteData":"Format string vulnerability in the SMTP service in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to execute arbitrary code via format string specifiers to the (1) EXPN, (2) MAIL, (3) MAIL FROM, and (4) RCPT TO commands.","Type":"Description","Title":"CVE-2005-2931"},{"CveYear":"2005","CveId":"2931","Ordinal":"2","NoteData":"2005-12-06","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"2931","Ordinal":"3","NoteData":"2005-12-09","Type":"Other","Title":"Modified"}]}}}