Vulnerability Description
Stack-based buffer overflow in the DoWebMenuAction function in the IncrediMail IMMenuShellExt ActiveX control (ImShExt.dll) allows remote attackers to execute arbitrary code via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Incredimail | Immenushellext Activex Control | All versions |
References
- http://osvdb.org/34331
- http://secunia.com/advisories/25051
- http://www.kb.cert.org/vuls/id/906777US Government Resource
- http://www.securityfocus.com/bid/23674
- http://www.vupen.com/english/advisories/2007/1551
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33928
- http://osvdb.org/34331
- http://secunia.com/advisories/25051
- http://www.kb.cert.org/vuls/id/906777US Government Resource
- http://www.securityfocus.com/bid/23674
- http://www.vupen.com/english/advisories/2007/1551
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33928
FAQ
What is CVE-2007-1683?
CVE-2007-1683 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Stack-based buffer overflow in the DoWebMenuAction function in the IncrediMail IMMenuShellExt ActiveX control (ImShExt.dll) allows remote attackers to execute arbitrary code via unspecified vectors.
How severe is CVE-2007-1683?
CVE-2007-1683 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1683?
Check the references section above for vendor advisories and patch information. Affected products include: Incredimail Immenushellext Activex Control.