Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mp6x-6v97-mg8p

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.

Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.

EPSS

Процентиль: 90%
0.05266
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 18 лет назад

Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.

EPSS

Процентиль: 90%
0.05266
Низкий

Дефекты

CWE-119