vendor:
Imapd
by:
Luca Ercoli
7,5
CVSS
HIGH
Buffer Overrun
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: Imapd
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005
FTGate Imapd BufferOverrun
This exploit is for FTGate Imapd BufferOverrun vulnerability. It uses IO::Socket to connect to the host on port 143 and sends a malicious payload of 224 bytes followed by 11305 bytes of C characters. This causes a buffer overflow and allows the attacker to execute arbitrary code.
Mitigation:
Upgrade to the latest version of FTGate Imapd.