Vulnerability Name: | CVE-2007-2795 (CCN-35504) | ||||||||
Assigned: | 2007-07-18 | ||||||||
Published: | 2007-07-18 | ||||||||
Updated: | 2009-01-28 | ||||||||
Summary: | Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C) 7.5 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-2795 Source: MITRE Type: CNA CVE-2007-3927 Source: CCN Type: SA26123 Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows Source: CCN Type: SECTRACK ID: 1018421 IMail Server Heap Overflow in `Imailsec.dll` Lets Remote Users Execute Arbitrary Code Source: CCN Type: Ipswitch Inc. Web site Release notes for IMail Server 2006.21 (v9.21) Source: CONFIRM Type: Patch http://www.ipswitch.com/support/imail/releases/im200621.asp Source: CCN Type: OSVDB ID: 45818 Ipswitch IMail Server Imailsec Unspecified Remote Code Execution Source: CCN Type: OSVDB ID: 45819 Ipswitch IMail Server subscribe Function Unspecified Issue Source: CCN Type: BID-24962 Ipswitch IMail Server Multiple Buffer Overflow Vulnerabilities Source: MISC Type: Patch http://www.zerodayinitiative.com/advisories/ZDI-07-042/ Source: MISC Type: Patch http://www.zerodayinitiative.com/advisories/ZDI-07-043/ Source: XF Type: UNKNOWN ipswitch-imail-imailsec-bo(35504) Source: CCN Type: ZDI-07-042 Ipswitch IMail Server GetIMailHostEntry Memory Corruption Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
Vulnerability Name: | CVE-2007-2795 (CCN-35505) | ||||||||
Assigned: | 2007-07-18 | ||||||||
Published: | 2007-07-18 | ||||||||
Updated: | 2009-01-28 | ||||||||
Summary: | Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C) 7.5 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-2795 Source: MITRE Type: CNA CVE-2007-3927 Source: CCN Type: SA26123 Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows Source: CCN Type: SECTRACK ID: 1018421 IMail Server Heap Overflow in `Imailsec.dll` Lets Remote Users Execute Arbitrary Code Source: CCN Type: Ipswitch Inc. Web site Release notes for IMail Server 2006.21 (v9.21) Source: CCN Type: OSVDB ID: 45818 Ipswitch IMail Server Imailsec Unspecified Remote Code Execution Source: CCN Type: OSVDB ID: 45819 Ipswitch IMail Server subscribe Function Unspecified Issue Source: CCN Type: BID-24962 Ipswitch IMail Server Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN ipswitch-imail-subscribe-bo(35505) Source: CCN Type: ZDI-07-043 Ipswitch IMail IMAP Daemon SUBSCRIBE Stack Overflow Vulnerability | ||||||||
BACK |