Vulnerability Description
Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Imail | 8.0.3 |
Related Weaknesses (CWE)
References
- http://osvdb.org/39390
- http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html
- http://www.securityfocus.com/bid/25762Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36723
- https://www.exploit-db.com/exploits/4438
- http://osvdb.org/39390
- http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html
- http://www.securityfocus.com/bid/25762Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36723
- https://www.exploit-db.com/exploits/4438
FAQ
What is CVE-2007-5094?
CVE-2007-5094 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages wit...
How severe is CVE-2007-5094?
CVE-2007-5094 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5094?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Imail.