Ipswitch IMail 5.0 / Ipswitch WS_FTP Server 1.0.1/1.0.2 - Local Privilege Escalation

Author: Marc
type: local
platform: windows
port: 
date_added: 1999-02-04  
date_updated: 2016-09-27  
verified: 1  
codes: CVE-1999-1171;OSVDB-10841;CVE-1999-1170  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 19167.txt  
source: https://www.securityfocus.com/bid/218/info

Non-administrative Imail and WS_FTP Server users may elevate their privileges to administrator for these applications by modifying a specific registry value. Once a person has obtained administrative privileges, they may use the application interface (locally) to read email, create accounts, delete accounts, etc.

Access the following registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Ipswitch\IMail\Domains\Machine_name\Users\Username"
Modify the Flag value to read "1920". 1920 gives the user account administrator permissions to IMail and WS_FTP Server.