[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-2795

Date: (C)2009-01-27   (M)2015-12-16
 
CVSS Score: 9.0Access Vector: NETWORK
Exploitability Subscore: 8.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: SINGLE_INSTANCE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.

Reference:
http://www.ipswitch.com/support/imail/releases/im200621.asp
http://www.zerodayinitiative.com/advisories/ZDI-07-042/
http://www.zerodayinitiative.com/advisories/ZDI-07-043/

CPE    2
cpe:/a:ipswitch:imail:2006.2
cpe:/a:ipswitch:imail:2006.1
CWE    1
CWE-119

© 2013 SecPod Technologies