Multiple stack-based buffer overflows in CMailCOM.dll in CMailServer 5.4.6 allow remote attackers to execute arbitrary code via a long argument to the (1) CreateUserPath, (2) Logout, (3) DeleteMailByUID, (4) MoveToInbox, (5) MoveToFolder, (6) DeleteMailEx, (7) GetMailDataEx, (8) SetReplySign, (9) SetForwardSign, and (10) SetReadSign methods, which are not properly handled by (a) the POP3 Class ActiveX control (CMailCom.POP3); or a long argument to the (11) AddAttach, (12) SetSubject, (13) SetBcc, (14) SetBody, (15) SetCc, (16) SetFrom, (17) SetTo, and (18) SetFromUID methods, which are not properly handled by the Class ActiveX control (CMailCOM.SMTP), as demonstrated via the indexOfMail parameter to mwmail.asp.
References
Configurations
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/46750 - | |
References | () http://secunia.com/advisories/30940 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/30098 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43594 - | |
References | () https://www.exploit-db.com/exploits/6012 - |
Information
Published : 2009-08-10 18:30
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6922
Mitre link : CVE-2008-6922
CVE.ORG link : CVE-2008-6922
JSON object : View
Products Affected
youngzsoft
- cmailserver
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer