CVE-2024-6744

The SMTP Listener of Secure Email Gateway from Cellopoint does not properly validate user input, leading to a Buffer Overflow vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the remote server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cellopoint:secure_email_gateway:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:50

Type Values Removed Values Added
References () https://www.twcert.org.tw/en/cp-139-7937-acbb5-2.html - Third Party Advisory () https://www.twcert.org.tw/en/cp-139-7937-acbb5-2.html - Third Party Advisory
References () https://www.twcert.org.tw/tw/cp-132-7936-f6381-1.html - Third Party Advisory () https://www.twcert.org.tw/tw/cp-132-7936-f6381-1.html - Third Party Advisory

16 Jul 2024, 18:06

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:cellopoint:secure_email_gateway:*:*:*:*:*:*:*:*
References () https://www.twcert.org.tw/en/cp-139-7937-acbb5-2.html - () https://www.twcert.org.tw/en/cp-139-7937-acbb5-2.html - Third Party Advisory
References () https://www.twcert.org.tw/tw/cp-132-7936-f6381-1.html - () https://www.twcert.org.tw/tw/cp-132-7936-f6381-1.html - Third Party Advisory
First Time Cellopoint
Cellopoint secure Email Gateway
Summary
  • (es) El detector SMTP de Secure Email Gateway de Cellopoint no valida correctamente la entrada del usuario, lo que genera una vulnerabilidad de desbordamiento del búfer. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad para ejecutar comandos arbitrarios del sistema en el servidor remoto.

15 Jul 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-15 07:15

Updated : 2024-11-21 09:50


NVD link : CVE-2024-6744

Mitre link : CVE-2024-6744

CVE.ORG link : CVE-2024-6744


JSON object : View

Products Affected

cellopoint

  • secure_email_gateway
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write