Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (E-mail Server)  >   Ipswitch Collaboration Suite Vendors:   Ipswitch
Ipswitch Collaboration Suite SMTP Command Format String Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015317
SecurityTracker URL:
CVE Reference:   CVE-2005-2931   (Links to External Site)
Date:  Dec 7 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 2.02
Description:   A vulnerability was reported in Ipswitch Collaboration Suite. A remote user can execute arbitrary code on the target system.

The software does not properly validate user-supplied input in certain SMTP commands. A remote user can send a specially crafted SMTP command containing format string specifiers to trigger a format string vulnerability and execute arbitrary code on the target system.

The EXPN, MAIL, MAIL FROM, and RCPT TO commands are affected.

The vendor was notified on September 8, 2005.

The original advisory is available at:

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fixed version (2.02), available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Windows (2000), Windows (2003)

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] iDEFENSE Security Advisory 12.06.05: Ipswitch

Ipswitch Collaboration Suite SMTP Format String Vulnerability

iDEFENSE Security Advisory 12.06.05
December 6, 2005


Ipswitch Collaboration Suite provides e-mail and real-time
collaboration, calendar and contact list sharing, and protection from
spam and viruses, all delivered in an easy to use suite.


Remote exploitation of a format string vulnerability in Ipswitch
IMail allows remote attackers to execute arbitrary code.

The vulnerability specifically exists due to improper use of functions
which allow format specifiers in the SMTP service included with ICS.
Remote attackers can supply format string values to certain string
functions to cause memory corruption leading to remote code execution.
The vulnerability may be exploited by supplying specially crafted
strings to any of the following SMTP commands: EXPN, MAIL, MAIL FROM,
RCPT TO. All of the commands are handled by the same function which
parses user-supplied input strings. The following debugger session
shows a backtrace with user-supplied strings as values. With properly
constructed input value, the strings would be interpreted as memory
addresses that would be executed upon returning from the current

00A7F370   006020A0
00A7F374   00A7F634  ASCII 5B,"] MAIL
00A7F378   00000000
00A7F37C   00000000
00A7F380   7C34FC0B  RETURN to MSVCR71.7C34FC0B from MSVCR71.write_char
00A7F384   00602048
00A7F388   00A7F648  ASCII 20,"FROM:C:\apps\Ipswitch\Collaborat"


Successful exploitation of the format string vulnerability allows
unauthenticated remote attackers to execute arbitrary code. Ipswitch
mail services are commonly configured to allow untrusted access. The
use of a firewall or other mitigating strategy is highly recommended
due to the nature of this vulnerability. The IMail SMTP server is
installed by default.


iDEFENSE Labs has confirmed the existence of this vulnerability in
Ipswitch Collaboration Suite 8.20.


iDEFENSE is currently unaware of any effective workarounds for this
issue. Access to the affected host should be filtered at the network
boundary if global accessibility is not required. Restricting access to
only trusted hosts and networks may reduce the likelihood of


Ipswitch Collaboration Suite 2.02 has been released to address this
issue and is available for download at:

IMail Server 8.22  has been released to address this issue and is
available for download at:


The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-2931 to this issue. This is a candidate for inclusion in
the CVE list (, which standardizes names for
security problems.


09/08/2005  Initial vendor notification
09/13/2005  Initial vendor response
10/06/2005  Coordinated public disclosure


iDEFENSE credits Nico with the discovery of this vulnerability.

Get paid for vulnerability research

Free tools, research and upcoming events


Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC