Vulnerability Description
Buffer overflow in the pop3 service in Hexamail Server 3.0.0.001 Lite allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long USER command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hexamail | Hexamail Server | 3.0.0.001_lite |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/26666
- http://www.securityfocus.com/bid/25496
- http://www.securitytracker.com/id?1018637
- http://www.vupen.com/english/advisories/2007/3044
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36369
- https://www.exploit-db.com/exploits/4344
- http://secunia.com/advisories/26666
- http://www.securityfocus.com/bid/25496
- http://www.securitytracker.com/id?1018637
- http://www.vupen.com/english/advisories/2007/3044
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36369
- https://www.exploit-db.com/exploits/4344
FAQ
What is CVE-2007-4646?
CVE-2007-4646 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in the pop3 service in Hexamail Server 3.0.0.001 Lite allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long USER command.
How severe is CVE-2007-4646?
CVE-2007-4646 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4646?
Check the references section above for vendor advisories and patch information. Affected products include: Hexamail Hexamail Server.