IMAP.APPEND.Command.Buffer.Overflow
Description
This indicates an attack attempt against a buffer-overflow vulnerability in the IMAP service in NetWin Surgemail.
The vulnerability is caused by an error when the vulnerable software handles a specially crafted overly long argument to the APPEND command. It allows a remote attacker to cause a denial of service (crash) and possibly execute arbitrary code.
Affected Products
NetWin SurgeMail 3.9e
Impact
Denial of service
Recommended Actions
Apply the patch from the vendor:
http://www.netwinsite.com/surgemail/help/updates.htm
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |