Vulnerability Description
The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a large amount of trailing whitespace followed by a malicious value, which triggers SQL buffer truncation due to length inconsistencies between variables.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailmarshal | Mailmarshal Smtp | <= 6.2.0 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064676.htmlPatch
- http://secunia.com/advisories/26018Vendor Advisory
- http://securityreason.com/securityalert/2895
- http://www.sec-1labs.co.uk/advisories/BTA_Full.pdfURL Repurposed
- http://www.securityfocus.com/bid/24936
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064676.htmlPatch
- http://secunia.com/advisories/26018Vendor Advisory
- http://securityreason.com/securityalert/2895
- http://www.sec-1labs.co.uk/advisories/BTA_Full.pdfURL Repurposed
- http://www.securityfocus.com/bid/24936
FAQ
What is CVE-2007-3796?
CVE-2007-3796 is a vulnerability with a CVSS score of 7.6 (HIGH). The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a ...
How severe is CVE-2007-3796?
CVE-2007-3796 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3796?
Check the references section above for vendor advisories and patch information. Affected products include: Mailmarshal Mailmarshal Smtp.