Vulnerability Details : CVE-2007-1373
Public exploit exists!
Stack-based buffer overflow in Mercury/32 (aka Mercury Mail Transport System) 4.01b and earlier allows remote attackers to execute arbitrary code via a long LOGIN command. NOTE: this might be the same issue as CVE-2006-5961.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-1373
- cpe:2.3:a:pmail:mercury_mail_transport_system:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1373
77.85%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2007-1373
-
Mercury/32 4.01 IMAP LOGIN SEH Buffer Overflow
Disclosure Date: 2007-03-06First seen: 2020-04-26exploit/windows/imap/mercury_loginThis module exploits a stack buffer overflow in Mercury/32 <= 4.01b IMAPD LOGIN verb. By sending a specially crafted login command, a buffer is corrupted, and code execution is possible. This vulnerability was discovered by (mu-b at digit-labs.org). Authors:
CVSS scores for CVE-2007-1373
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2007-1373
Jump to