IBM has issued a security bulletin to address a stack-based buffer overflow vulnerability in IMAP service. A remote and authenticated attacker could exploit the vulnerability by sending a specially-crafted IMAP command that references a mailbox name to an affected system.
Reports indicate that there is public exploit code available.
Successful exploitation could lead to arbitrary code execution.
The vendor has released fixes to address the issues and they can be downloaded at the following URLs:
http://www-01.ibm.com/support/docview.wss?uid=swg22002280
https://www.kb.cert.org/vuls/id/676632
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1274