Vulnerability Description
Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Ipswitch Collaboration Suite | 2006.02_premium |
References
- http://secunia.com/advisories/19168PatchVendor Advisory
- http://securityreason.com/securityalert/577
- http://securitytracker.com/id?1015759
- http://www.ipswitch.com/support/ics/updates/ics200603prem.asp
- http://www.osvdb.org/23796
- http://www.securityfocus.com/archive/1/427536/100/0/threaded
- http://www.securityfocus.com/bid/17063
- http://www.vupen.com/english/advisories/2006/0907
- http://www.zerodayinitiative.com/advisories/ZDI-06-003.htmlVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25133
- http://secunia.com/advisories/19168PatchVendor Advisory
- http://securityreason.com/securityalert/577
- http://securitytracker.com/id?1015759
- http://www.ipswitch.com/support/ics/updates/ics200603prem.asp
- http://www.osvdb.org/23796
FAQ
What is CVE-2005-3526?
CVE-2005-3526 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Buffer overflow in the IMAP daemon in Ipswitch Collaboration Suite 2006.02 and earlier allows remote authenticated users to execute arbitrary code via a long FETCH command.
How severe is CVE-2005-3526?
CVE-2005-3526 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3526?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Ipswitch Collaboration Suite.