IMail's whois32 service can be remotely crashed

Risk Level: Medium risk vulnerability  Medium

Check or Attack Name: IMailWhoisOverflow

Platforms: Imail
Description:

IMail is a popular multi-protocol mail server for Windows NT environments. The Whois32 service included in the IMail package contains a buffer overflow vulnerability that could allow remote attackers to crash the service. It isn't known whether this hole can be manipulated to execute arbitrary code on the victim machine.

Remedy:

This vulnerability has been demonstrated through version 5.0, and later versions may be vulnerable as well. Users are encouraged to contact IPSwitch for fix information.

References:

Ipswitch, Inc. Product Information, IMail Server by Ipswitch, http://www.ipswitch.com/Products/IMail_Server/index.asp

eEye Digital Security Team Alert AD03011999, Multiple IMail Vulnerabilites, http://www.eeye.com/database/advisories/ad03011999/ad03011999.html


X-Force Logo
Know Your Risks