Vulnerability Description
Stack-based buffer overflow in the IMAP service in SurgeMail 38k allows remote authenticated users to execute arbitrary code via a long argument to the SEARCH command. NOTE: this might overlap CVE-2007-4372.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netwin | Surgemail | 38k |
References
- http://marc.info/?l=full-disclosure&m=118710179924684&w=2
- http://secunia.com/advisories/26464Vendor Advisory
- http://www.securityfocus.com/bid/25318
- http://www.vupen.com/english/advisories/2007/2875
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36009
- https://www.exploit-db.com/exploits/4287
- http://marc.info/?l=full-disclosure&m=118710179924684&w=2
- http://secunia.com/advisories/26464Vendor Advisory
- http://www.securityfocus.com/bid/25318
- http://www.vupen.com/english/advisories/2007/2875
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36009
- https://www.exploit-db.com/exploits/4287
FAQ
What is CVE-2007-4377?
CVE-2007-4377 is a vulnerability with a CVSS score of 6.0 (MEDIUM). Stack-based buffer overflow in the IMAP service in SurgeMail 38k allows remote authenticated users to execute arbitrary code via a long argument to the SEARCH command. NOTE: this might overlap CVE-20...
How severe is CVE-2007-4377?
CVE-2007-4377 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4377?
Check the references section above for vendor advisories and patch information. Affected products include: Netwin Surgemail.