Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/39390 - | |
References | () http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html - | |
References | () http://www.securityfocus.com/bid/25762 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36723 - | |
References | () https://www.exploit-db.com/exploits/4438 - |
Information
Published : 2007-09-26 22:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5094
Mitre link : CVE-2007-5094
CVE.ORG link : CVE-2007-5094
JSON object : View
Products Affected
ipswitch
- imail
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer