IMail's whois32 service can be remotely crashed |
---|
Risk Level: | Medium | Check or Attack Name: IMailWhoisOverflow |
---|---|---|
Platforms: | Imail | |
Description: | IMail is a popular multi-protocol mail server for Windows NT environments. The Whois32 service included in the IMail package contains a buffer overflow vulnerability that could allow remote attackers to crash the service. It isn't known whether this hole can be manipulated to execute arbitrary code on the victim machine. |
|
Remedy: | This vulnerability has been demonstrated through version 5.0, and later versions may be vulnerable as well. Users are encouraged to contact IPSwitch for fix information. |
|
References: | Ipswitch, Inc. Product Information, IMail Server by Ipswitch, http://www.ipswitch.com/Products/IMail_Server/index.asp eEye Digital Security Team Alert AD03011999, Multiple IMail Vulnerabilites, http://www.eeye.com/database/advisories/ad03011999/ad03011999.html |
Know Your Risks |