Vulnerability Description
Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Imail Client | 9.22 |
| Ipswitch | Imail Server | 2006.22 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/26905Vendor Advisory
- http://secunia.com/secunia_research/2007-81/advisory/Vendor Advisory
- http://www.securityfocus.com/bid/26252
- http://www.vupen.com/english/advisories/2007/3659
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38151
- http://secunia.com/advisories/26905Vendor Advisory
- http://secunia.com/secunia_research/2007-81/advisory/Vendor Advisory
- http://www.securityfocus.com/bid/26252
- http://www.vupen.com/english/advisories/2007/3659
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38151
FAQ
What is CVE-2007-4345?
CVE-2007-4345 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message.
How severe is CVE-2007-4345?
CVE-2007-4345 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4345?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Imail Client, Ipswitch Imail Server.