ID CVE-2007-3796
Summary The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a large amount of trailing whitespace followed by a malicious value, which triggers SQL buffer truncation due to length inconsistencies between variables.
References
Vulnerable Configurations
  • cpe:2.3:a:mailmarshal:mailmarshal_smtp:*:*:*:*:*:*:*:*
    cpe:2.3:a:mailmarshal:mailmarshal_smtp:*:*:*:*:*:*:*:*
CVSS
Base: 7.6 (as of 14-02-2024 - 01:17)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:H/Au:N/C:C/I:C/A:C
refmap via4
bid 24936
fulldisc 20070717 [Sec-1 Ltd] Advisory: MailMarshal Spam Quarantine Password Retrieval Vulnerability
misc http://www.sec-1labs.co.uk/advisories/BTA_Full.pdf
secunia 26018
sreason 2895
Last major update 14-02-2024 - 01:17
Published 17-07-2007 - 23:30
Last modified 14-02-2024 - 01:17
Back to Top