source: http://www.securityfocus.com/bid/502/info The imapd login process is susceptible to a buffer overflow attack which will crash the service. Telnet to target machine, port 143 * OK IMAP4 Server (IMail 4.06) X LOGIN glob1 glob2 Where glob1 is 1200 characters and glob2 is 1300 characters.
Related ExploitsTrying to match CVEs (1): CVE-1999-1557
Trying to match OSVDBs (1): 10842
Other Possible E-DB Search Terms: Ipswitch IMail 5.0, Ipswitch IMail