Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [Full-disclosure] IpSwitch IMAP Server LOGON stack overflow
Date: Wed Jun 08 2005 - 15:55:33 CDT
Ah, you refer to this one.
"The first vulnerability specifically exists in the handling of a long
username to the LOGIN command. A long username argument of approximately
2,000 bytes will cause a stack based unicode string buffer overflow
providing the attacker with partial control over EIP. As this
vulnerability is in the LOGIN command itself, valid credentials are not
Later it reads
"The second vulnerability also exists in the handling of the LOGIN
command username argument, however it lends itself to easier
I guess I shouldn't have trusted this statement :)
Perhaps I'll take a look at this one next, or just use your CANVAS example :)
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/