ID

VAR-200208-0143


CVE

CVE-2002-0777


TITLE

Ipswitch IMail Server LDAP Remote buffer overflow vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200208-106

DESCRIPTION

Buffer overflow in the LDAP component of Ipswitch IMail 7.1 and earlier allows remote attackers to execute arbitrary code via a long "bind DN" parameter. Ipswitch IMail is an e-mail server that serves clients their mail via a web interface. It runs on Microsoft Windows operating systems. IMail normally runs in the SYSTEM context, meaning that successful exploitation will result in a full compromise of the underlying system. It should be noted that this condition may also be exploited to trigger a denial of service. The Ipswitch IMail service program includes multiple components including LDAP service, which allows remote clients to read the IMail directory, and there is a loophole in the authentication process that allows remote attackers to access the server with the authority of the SYSTEM account

Trust: 1.26

sources: NVD: CVE-2002-0777 // BID: 4780 // VULHUB: VHN-5168

AFFECTED PRODUCTS

vendor:ipswitchmodel:imailscope:eqversion:7.1

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.7

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.6

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.5

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.4

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.3

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.2

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:7.0.1

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:6.4

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:6.3

Trust: 1.9

vendor:ipswitchmodel:imailscope:eqversion:6.2

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.1

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.6

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.5

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.4

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.3

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.2

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0.1

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:6.0

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.8

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.7

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.6

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0.5

Trust: 1.3

vendor:ipswitchmodel:imailscope:eqversion:5.0

Trust: 1.3

sources: BID: 4780 // CNNVD: CNNVD-200208-106 // NVD: CVE-2002-0777

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0777
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200208-106
value: CRITICAL

Trust: 0.6

VULHUB: VHN-5168
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-0777
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-5168
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-5168 // CNNVD: CNNVD-200208-106 // NVD: CVE-2002-0777

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0777

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200208-106

TYPE

Unknown

Trust: 0.9

sources: BID: 4780 // CNNVD: CNNVD-200208-106

EXTERNAL IDS

db:BIDid:4780

Trust: 2.0

db:NVDid:CVE-2002-0777

Trust: 1.7

db:CNNVDid:CNNVD-200208-106

Trust: 0.7

db:BUGTRAQid:20020520 FOUNDSTONE ADVISORY - BUFFER OVERFLOW IN IPSWITCH IMAIL 7.1 AND PRIOR (FWD)

Trust: 0.6

db:XFid:9116

Trust: 0.6

db:VULHUBid:VHN-5168

Trust: 0.1

sources: VULHUB: VHN-5168 // BID: 4780 // CNNVD: CNNVD-200208-106 // NVD: CVE-2002-0777

REFERENCES

url:http://www.securityfocus.com/bid/4780

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2002-05/0172.html

Trust: 1.7

url:http://www.iss.net/security_center/static/9116.php

Trust: 1.7

url:http://www.ipswitch.com/products/imail_server/index.asp

Trust: 0.3

url:http://www.ipswitch.com/support/imail/patch-upgrades.html

Trust: 0.3

sources: VULHUB: VHN-5168 // BID: 4780 // CNNVD: CNNVD-200208-106 // NVD: CVE-2002-0777

CREDITS

Dave Ahmad※ da@securityfocus.com

Trust: 0.6

sources: CNNVD: CNNVD-200208-106

SOURCES

db:VULHUBid:VHN-5168
db:BIDid:4780
db:CNNVDid:CNNVD-200208-106
db:NVDid:CVE-2002-0777

LAST UPDATE DATE

2025-04-03T22:16:55.705000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-5168date:2008-09-05T00:00:00
db:BIDid:4780date:2002-05-20T00:00:00
db:CNNVDid:CNNVD-200208-106date:2005-10-12T00:00:00
db:NVDid:CVE-2002-0777date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-5168date:2002-08-12T00:00:00
db:BIDid:4780date:2002-05-20T00:00:00
db:CNNVDid:CNNVD-200208-106date:2002-05-20T00:00:00
db:NVDid:CVE-2002-0777date:2002-08-12T04:00:00