Описание
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
Ссылки
- Vendor Advisory
- Patch
- Patch
- Patch
- Vendor Advisory
- Patch
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ipswitch:imail_plus:2006:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:imail_secure_server:2006:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_premium:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_standard:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.75047
Высокий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an '@' character and before a ':' character.
EPSS
Процентиль: 99%
0.75047
Высокий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other