Vulnerability Details : CVE-2007-1083
Buffer overflow in the Configuration Checker (ConfigChk) ActiveX control in VSCnfChk.dll 2.0.0.2 for Verisign Managed PKI Service, Secure Messaging for Microsoft Exchange, and Go Secure! allows remote attackers to execute arbitrary code via long arguments to the VerCompare method.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2007-1083
Probability of exploitation activity in the next 30 days: 51.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-1083
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
[email protected] |
CWE ids for CVE-2007-1083
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2007-1083
-
http://jvn.jp/cert/JVNVU%23308087/index.html
-
http://www.securityfocus.com/bid/22676
-
http://www.securitytracker.com/id?1017693
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=479
-
http://www.securitytracker.com/id?1017692
-
http://attrition.org/pipermail/vim/2007-February/001385.html
-
http://www.securitytracker.com/id?1017694
-
https://download.verisign.co.jp/support/announce/20070216.html
Vendor Advisory
-
http://attrition.org/pipermail/vim/2007-February/001384.html
-
http://www.kb.cert.org/vuls/id/308087
US Government Resource
-
http://www.jpcert.or.jp/at/2007/at070006.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32639
-
http://www.securityfocus.com/bid/22671
-
http://www.vupen.com/english/advisories/2007/0702
Products affected by CVE-2007-1083
- cpe:2.3:a:verisign:mpki:*:*:*:*:*:*:*:*
- cpe:2.3:a:verisign:mpki:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:verisign:mpki:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:verisign:mpki:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:verisign:mpki:4.6.1:*:*:*:*:*:*:*