Vulnerability Description
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Imail Plus | 2006 |
| Ipswitch | Imail Secure Server | 2006 |
| Ipswitch | Ipswitch Collaboration Suite | 2006_premium |
References
- http://secunia.com/advisories/21795Vendor Advisory
- http://securitytracker.com/id?1016803
- http://securitytracker.com/id?1016804
- http://www.ipswitch.com/support/ics/updates/ics20061.aspPatch
- http://www.ipswitch.com/support/imail/releases/im20061.asp
- http://www.securityfocus.com/archive/1/445521/100/0/threaded
- http://www.securityfocus.com/bid/19885Patch
- http://www.vupen.com/english/advisories/2006/3496
- http://www.zerodayinitiative.com/advisories/ZDI-06-028.htmlPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28789
- http://secunia.com/advisories/21795Vendor Advisory
- http://securitytracker.com/id?1016803
- http://securitytracker.com/id?1016804
- http://www.ipswitch.com/support/ics/updates/ics20061.aspPatch
- http://www.ipswitch.com/support/imail/releases/im20061.asp
FAQ
What is CVE-2006-4379?
CVE-2006-4379 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code...
How severe is CVE-2006-4379?
CVE-2006-4379 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4379?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Imail Plus, Ipswitch Imail Secure Server, Ipswitch Ipswitch Collaboration Suite.