Vulnerability Details : CVE-2007-5007
Potential exploit
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-5007
- cpe:2.3:a:gnome:balsa:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.1.90:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.1.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.17:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.19:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:balsa:2.3.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-5007
1.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5007
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2007-5007
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-5007
-
Red Hat 2008-01-09Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.
References for CVE-2007-5007
-
http://www.novell.com/linux/security/advisories/2007_19_sr.html
404 Page Not Found | SUSE
-
http://secunia.com/advisories/27272
About Secunia Research | FlexeraVendor Advisory
-
http://secunia.com/advisories/26987
About Secunia Research | FlexeraVendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200710-17.xml
Balsa: Buffer overflow (GLSA 200710-17) — Gentoo security
-
http://www.vupen.com/english/advisories/2007/3263
Site en construction
-
http://www.securityfocus.com/bid/25777
Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=297581
297581 – (CVE-2007-5007) CVE-2007-5007 balsa: IMAP server triggerred stack overflow
-
http://bugs.gentoo.org/show_bug.cgi?id=193179
193179 – mail-client/balsa < 2.3.20 ir_fetch_seq() Stack-based buffer overflow (CVE-2007-5007)Exploit
-
http://secunia.com/advisories/26947
About Secunia Research | FlexeraVendor Advisory
-
http://bugzilla.gnome.org/show_bug.cgi?id=474366
Bug 474366 – buffer overflow in ir_fetch_seq()
-
http://osvdb.org/40585
-
http://mail.gnome.org/archives/balsa-list/2007-September/msg00010.html
ANNOUNCE: balsa-2.3.20 releasedPatch
Jump to