[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <f54c85b40512130807n7b88a0a8na9935720b5abfa09@mail.gmail.com>
Date: Tue, 13 Dec 2005 10:07:03 -0600
From: Owen Dhu <0wnj00@...il.com>
To: bugtraq@...urityfocus.com, vulnwatch@...nwatch.org,
full-disclosure@...ts.grok.org.uk
Subject: Re: iDEFENSE Security Advisory 12.06.05: Ipswitch
Collaboration Suite SMTP Format String Vulnerability
On 12/6/05, labs-no-reply@...fense.com <labs-no-reply@...fense.com> wrote:
> Ipswitch Collaboration Suite SMTP Format String Vulnerability
[...]
> Remote exploitation of a format string vulnerability in Ipswitch
> IMail allows remote attackers to execute arbitrary code.
Can iDEFENSE (or anyone else) elaborate on this? I have been working with
this for a little while and iMail doesn't seem to be exploitable in this way.
TIA.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists