CVE-1999-1551
CVSS5.0
发布时间 :1999-03-02 00:00:00
修订时间 :2016-10-17 22:05:55
NMCOES    

[原文]Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL.


[CNNVD]Ipswitch IMail缓冲区溢出DoS漏洞(CNNVD-199903-023)

        Ipswitch IMail Service 5.0版本存在缓冲区溢出漏洞。该漏洞可以引起拒绝服务(崩溃)并可能通过长URL执行任意代码。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:ipswitch:imail:5.0Ipswitch IMail 5.0
cpe:/a:ipswitch:imail:6.0Ipswitch IMail 6.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1551
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1551
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199903-023
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=92038879607336&w=2
(UNKNOWN)  BUGTRAQ  19990302 Multiple IMail Vulnerabilites
http://www.securityfocus.com/bid/505
(PATCH)  BID  505
http://xforce.iss.net/static/1898.php
(UNKNOWN)  XF  imail-websvc-overflow(1898)

- 漏洞信息

Ipswitch IMail缓冲区溢出DoS漏洞
中危 缓冲区溢出
1999-03-02 00:00:00 2005-10-20 00:00:00
远程※本地  
        Ipswitch IMail Service 5.0版本存在缓冲区溢出漏洞。该漏洞可以引起拒绝服务(崩溃)并可能通过长URL执行任意代码。

- 公告与补丁

        Ipswitch have released patches which eliminates the vulnerability. They can be downloaded at the following location:
        http://www.ipswitch.com/support/patches-upgrades.html#IMail

- 漏洞信息 (19380)

Ipswitch IMail 5.0/6.0 Web Service Buffer Overflow DoS Vulnerability (EDBID:19380)
multiple dos
1999-03-01 Verified
0 Marc of eEye
N/A [点击下载]
source: http://www.securityfocus.com/bid/505/info

The IMail web server can be crashed by requesting an abnormally long URL. 

Telnet to target machine, port 8383

Send: GET /glob1/
Where glob1 is 3000 characters.

Marc Maiffret <marc@eeye.com> has released the following exploit: 

http://www.exploit-db.com/sploits/19380.zip		

- 漏洞信息

10843
Ipswitch IMail Web Service Long URL Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

A remote overflow exists in IMail Server. The application fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted HTTP GET request containing 3,000 bytes or more, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

1999-03-01 Unknow
1999-03-01 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Ipswitch has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Ipswitch IMail Web Service Buffer Overflow DoS Vulnerability
Boundary Condition Error 505
Yes Yes
1999-03-01 12:00:00 2009-07-11 12:56:00
eEye Advisory AD03011999 posted to Bugtraq March 1, 1999 by MArc of eEye <info@eEye.com>.

- 受影响的程序版本

Ipswitch IMail 6.0
- Microsoft Windows NT 3.5.1
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Ipswitch IMail 5.0
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0

- 漏洞讨论

The IMail web server can be crashed by requesting an abnormally long URL.

- 漏洞利用

Telnet to target machine, port 8383

Send: GET /glob1/
Where glob1 is 3000 characters.

Marc Maiffret &lt;marc@eeye.com&gt; has released the following exploit:

- 解决方案

Ipswitch have released patches which eliminates the vulnerability. They can be downloaded at the following location:

http://www.ipswitch.com/support/patches-upgrades.html#IMail

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站