Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jm4q-3jxm-v3w8

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.

The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.

EPSS

Процентиль: 90%
0.0541
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 19 лет назад

The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.

EPSS

Процентиль: 90%
0.0541
Низкий

Дефекты

CWE-119