Ipswitch IMail email session IDs are predictable
|imail-session-id-predictable (7278)||Medium Risk|
Ipswitch IMail uses predictable session IDs when cookie-based authentication is used. A remote attacker could predict a current valid session ID to gain access to a mail account without a valid username or password.
No remedy available as of May 1, 2013.
- BugTraq Mailing List, Thu Oct 11 2001 - 17:00:33 CDT: Ipswitch Imail 7.04 vulnerabilities.
- Ipswitch Web site: IMail Server News & Updates.
- BID-3428: Ipswitch IMail Server Predictable Session ID Vulnerability
- CVE-2001-1284: Ipswitch IMail 7.04 and earlier uses predictable session IDs for authentication, which allows remote attackers to hijack sessions of other users.
- OSVDB ID: 10846: Ipswitch IMail Predictable Session ID Authentication
- Ipswitch Imail Server 7.04
Oct 12, 2001
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this