HIGH · 7.5

CVE-2006-4379

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code...

Vulnerability Description

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
IpswitchImail Plus2006
IpswitchImail Secure Server2006
IpswitchIpswitch Collaboration Suite2006_premium

References

FAQ

What is CVE-2006-4379?

CVE-2006-4379 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code...

How severe is CVE-2006-4379?

CVE-2006-4379 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-4379?

Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Imail Plus, Ipswitch Imail Secure Server, Ipswitch Ipswitch Collaboration Suite.