Vulnerability Description
Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Ipswitch Collaboration Suite | <= 8.15 |
References
- http://secunia.com/advisories/14546Patch
- http://securitytracker.com/id?1013410Patch
- http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities
- http://www.securityfocus.com/bid/12780
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19655
- http://secunia.com/advisories/14546Patch
- http://securitytracker.com/id?1013410Patch
- http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities
- http://www.securityfocus.com/bid/12780
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19655
FAQ
What is CVE-2005-0707?
CVE-2005-0707 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in the IMAP daemon (IMAP4d32.exe) for Ipswitch Collaboration Suite (ICS) before 8.15 Hotfix 1 allows remote authenticated users to execute arbitrary code via a long EXAMINE command.
How severe is CVE-2005-0707?
CVE-2005-0707 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0707?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Ipswitch Collaboration Suite.