---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Ipswitch IMail Server "SEARCH" Command Multiple Buffer Overflows SECUNIA ADVISORY ID: SA26193 VERIFY ADVISORY: http://secunia.com/advisories/26193/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: Ipswitch Collaboration Suite (ICS) 2006 http://secunia.com/product/8652/ Ipswitch IMail Server 2006 http://secunia.com/product/8653/ DESCRIPTION: Multiple vulnerabilities have been discovered in Ipswitch IMail Server and Ipswitch Collaboration Suite (ICS), which can be exploited by malicious users to compromise a vulnerable system. The vulnerabilities are caused due to multiple boundary errors in the IMAP service when processing certain "SEARCH" command search keys ("BEFORE", "ON", "SINCE", "SENTBEFORE", "SENTON", "SENTSINCE"). This can be exploited to cause stack-based buffer overflows via overly long, quoted or unquoted arguments passed to the command. Successful exploitation allows execution of arbitrary code. The vulnerabilities are confirmed in IMail Premium versions 2006.2 and 2006.21. Other versions may also be affected. SOLUTION: Grant only trusted users access to the IMAP service. PROVIDED AND/OR DISCOVERED BY: Independently discovered by: * Secunia Research * ZhenHan Liu, Ph4nt0m Security Team. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------