Vulnerability Details : CVE-2007-3925
Public exploit exists!
Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-3925
- cpe:2.3:a:ipswitch:ipswitch_collaboration_suite:*:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:imail_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3925
97.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2007-3925
-
Ipswitch IMail IMAP SEARCH Buffer Overflow
Disclosure Date: 2007-07-18First seen: 2020-04-26exploit/windows/imap/ipswitch_searchThis module exploits a stack buffer overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have a
CVSS scores for CVE-2007-3925
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2007-3925
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-3925
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35500
-
http://www.securityfocus.com/bid/24962
Ipswitch IMail Server Multiple Buffer Overflow VulnerabilitiesPatch
-
http://www.securitytracker.com/id?1018419
-
http://www.vupen.com/english/advisories/2007/2574
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563
-
http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35496
Jump to