CVE-2005-2923
CVSS4.0
发布时间 :2005-12-06 20:03:00
修订时间 :2011-03-07 21:25:17
NMCOPS    

[原文]The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.


[CNNVD]Ipswitch IMail IMAP LIST命令远程拒绝服务漏洞(CNNVD-200512-106)

        Ipswitch IMail Server是Ipswitch协作组件中捆绑的一个邮件服务器。
        Ipswitch IMail在处理超长畸形的LIST命令时存在拒绝服务漏洞,成功利用这个漏洞的攻击者可以导致IMAP服务程序崩溃。Ipswitch的IMail IMAP Server中存在拒绝服务漏洞。如果用户提供了大约8000个字节的LIST命令参数的话,内部字符解析例程就会引用没有分配的内存部分,导致守护程序退出。
        

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: SINGLE_INSTANCE [--]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/a:ipswitch:ipswitch_collaboration_suite:2.01Ipswitch Ipswitch Collaboration Suite 2.01
cpe:/a:ipswitch:ipswitch_collaboration_suite:2.0Ipswitch Ipswitch Collaboration Suite 2.0
cpe:/a:ipswitch:imail_server:8.20Ipswitch IMail Server 8.20

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2923
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2923
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-106
(官方数据源) CNNVD

- 其它链接及资源

http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20051206 Ipswitch IMail IMAP List Command DoS Vulnerability
http://www.vupen.com/english/advisories/2005/2782
(UNKNOWN)  VUPEN  ADV-2005-2782
http://www.securityfocus.com/bid/15753
(UNKNOWN)  BID  15753
http://securitytracker.com/id?1015318
(UNKNOWN)  SECTRACK  1015318
http://secunia.com/advisories/17863
(UNKNOWN)  SECUNIA  17863

- 漏洞信息

Ipswitch IMail IMAP LIST命令远程拒绝服务漏洞
中危 边界条件错误
2005-12-06 00:00:00 2005-12-07 00:00:00
远程  
        Ipswitch IMail Server是Ipswitch协作组件中捆绑的一个邮件服务器。
        Ipswitch IMail在处理超长畸形的LIST命令时存在拒绝服务漏洞,成功利用这个漏洞的攻击者可以导致IMAP服务程序崩溃。Ipswitch的IMail IMAP Server中存在拒绝服务漏洞。如果用户提供了大约8000个字节的LIST命令参数的话,内部字符解析例程就会引用没有分配的内存部分,导致守护程序退出。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.ipswitch.com/support/ics/updates/ics202.asp
        http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp

- 漏洞信息 (F42191)

iDEFENSE Security Advisory 2005-12-06.2 (PacketStormID:F42191)
2005-12-09 00:00:00
iDefense Labs,Sebastian Apelt  idefense.com
advisory,remote,denial of service,imap
CVE-2005-2923
[点击下载]

iDEFENSE Security Advisory 12.06.05 - Remote exploitation of a denial of service (DoS) vulnerability in Ipswitch Inc.'s Imail IMAP server allows attackers to crash the target service, thereby preventing legitimate use. The problem specifically exists in handling long arguments to the LIST command. When a LIST command of approximately 8000 bytes is supplied, internal string parsing routines can be manipulated in such a way as to reference non-allocated sections of memory. This parsing error results in an unhandled access violation, forcing the daemon to exit. iDEFENSE has confirmed the existence of this vulnerability in Ipswitch IMail 8.2.

Ipswitch IMail IMAP List Command DoS Vulnerability

iDEFENSE Security Advisory 12.06.05
www.idefense.com/application/poi/display?id=347&type=vulnerabilities
December 6, 2005

I. BACKGROUND

Ipswitch Imail Server is an email server that is part of the IpSwitch
Collaboration suit. Imail Supports POP3, SMTP, IMAP and web based email
access. More Information can be located on the vendor    

- 漏洞信息

21499
Ipswitch IMail Server IMAP LIST Command Remote Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

- 时间线

2005-12-06 2005-09-08
Unknow Unknow

- 解决方案

Upgrade to Ipswitch Collaboration Suite 2.02, IMail Server 8.22 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
Boundary Condition Error 15753
Yes No
2005-12-06 12:00:00 2009-07-12 05:56:00
Sebastian Apelt is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ipswitch Ipswitch Collaboration Suite 2.0 1
Ipswitch Ipswitch Collaboration Suite
Ipswitch IMail 8.20
Ipswitch IMail 8.2
Ipswitch Ipswitch Collaboration Suite 2.0 2
Ipswitch IMail 8.22
Ipswitch IMail 8.2 Hotfix 2

- 不受影响的程序版本

Ipswitch Ipswitch Collaboration Suite 2.0 2
Ipswitch IMail 8.22
Ipswitch IMail 8.2 Hotfix 2

- 漏洞讨论

Ipswitch Collaboration Suite and IMail Server are prone to a remote denial of service vulnerability.

Successful exploitation will cause the affected server to crash, effectively denying service to legitimate users.

- 漏洞利用

No exploit is required.

- 解决方案

The vendor has released fixes to address this issue:


Ipswitch Ipswitch Collaboration Suite 2.0 1

Ipswitch IMail 8.20

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站