var-200707-0110
Vulnerability from variot

Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command. Ipswitch IMail Server is prone to multiple buffer-overflow vulnerabilities because the software fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer. Successful attacks allow arbitrary code to run, facilitating the remote compromise of affected computers. Exploit attempts may also cause the application to crash. Ipswitch IMail Server 2006 is vulnerable to these issues; other versions may also be affected. Ipswitch IMail Server is an American Ipswitch company's mail server running on the Microsoft Windows operating system. IMail bundles an IMAP daemon (imapd32.exe) that allows users to access mail.


Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications.


TITLE: Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows

SECUNIA ADVISORY ID: SA26123

VERIFY ADVISORY: http://secunia.com/advisories/26123/

CRITICAL: Highly critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: IMail Server 2006 http://secunia.com/product/8653/ Ipswitch Collaboration Suite 2006 http://secunia.com/product/8652/

DESCRIPTION: Some vulnerabilities have been reported in Ipswitch IMail Server and Collaboration Suite, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

Vulnerabilities #1 and #2 are reported in version 6.8.8.1 of imapd32.exe.

3) A boundary error in Imailsec can be exploited to cause a heap-based buffer overflow and allows execution of arbitrary code.

4) A boundary error in "subscribe" can be exploited to cause a buffer overflow. No further information is currently available.

Vulnerabilities #3 and #4 are reported in Ipswitch IMail Server and Collaboration Suite prior to version 2006.21.

SOLUTION: Update to IMail Server version 2006.21. http://www.ipswitch.com/support/imail/releases/im200621.asp

Update to Ipswitch Collaboration Suite 2006.21. http://www.ipswitch.com/support/ics/updates/ics200621.asp

PROVIDED AND/OR DISCOVERED BY: 1) Manuel Santamarina Suarez, reported via iDefense Labs. 2) An anonymous person, reported via iDefense Labs. 3, 4) The vendor credits TippingPoint and the Zero Day Initiative.

ORIGINAL ADVISORY: IPSwitch: http://www.ipswitch.com/support/imail/releases/im200621.asp http://www.ipswitch.com/support/ics/updates/ics200621.asp

iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200707-0110",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "collaboration suite",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ipswitch",
        "version": "2006.2"
      },
      {
        "model": "imail server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ipswitch",
        "version": "2006.2"
      },
      {
        "model": "imail server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ipswitch",
        "version": "2006"
      },
      {
        "model": "imail server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ipswitch",
        "version": "2006.21"
      },
      {
        "model": "collaboration suite",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ipswitch",
        "version": "2006.2"
      },
      {
        "model": "imail server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ipswitch",
        "version": "2006.2"
      },
      {
        "model": "imail server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "2006"
      },
      {
        "model": "imail server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ipswitch",
        "version": "2006.21"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "24962"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:ipswitch:imail_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Manuel Santamarina Suarez",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2007-3925",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2007-3925",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-27287",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-3925",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-3925",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200707-387",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-27287",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command. Ipswitch IMail Server is prone to multiple buffer-overflow vulnerabilities because the software fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer. \nSuccessful attacks allow arbitrary code to run, facilitating the remote compromise of affected computers. Exploit attempts may also cause the application to crash. \nIpswitch IMail Server 2006 is vulnerable to these issues; other versions may also be affected. Ipswitch IMail Server is an American Ipswitch company\u0027s mail server running on the Microsoft Windows operating system. IMail bundles an IMAP daemon (imapd32.exe) that allows users to access mail. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Full Featured Secunia Network Software Inspector (NSI) is now\navailable:\nhttp://secunia.com/network_software_inspector/\n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \n\n----------------------------------------------------------------------\n\nTITLE:\nIpswitch IMail Server/Collaboration Suite Multiple Buffer Overflows\n\nSECUNIA ADVISORY ID:\nSA26123\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26123/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nIMail Server 2006\nhttp://secunia.com/product/8653/\nIpswitch Collaboration Suite 2006\nhttp://secunia.com/product/8652/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Ipswitch IMail Server and\nCollaboration Suite, which can be exploited by malicious users and\nmalicious people to compromise a vulnerable system. \n\nVulnerabilities #1 and #2 are reported in version 6.8.8.1 of\nimapd32.exe. \n\n3) A boundary error in Imailsec can be exploited to cause a\nheap-based buffer overflow and allows execution of arbitrary code. \n\n4) A boundary error in \"subscribe\" can be exploited to cause a buffer\noverflow. No further information is currently available. \n\nVulnerabilities #3 and #4 are reported in Ipswitch IMail Server and\nCollaboration Suite prior to version 2006.21. \n\nSOLUTION:\nUpdate to IMail Server version 2006.21. \nhttp://www.ipswitch.com/support/imail/releases/im200621.asp\n\nUpdate to Ipswitch Collaboration Suite 2006.21. \nhttp://www.ipswitch.com/support/ics/updates/ics200621.asp\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Manuel Santamarina Suarez, reported via iDefense Labs. \n2) An anonymous person, reported via iDefense Labs. \n3, 4) The vendor credits TippingPoint and the Zero Day Initiative. \n\nORIGINAL ADVISORY:\nIPSwitch:\nhttp://www.ipswitch.com/support/imail/releases/im200621.asp\nhttp://www.ipswitch.com/support/ics/updates/ics200621.asp\n\niDefense:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "BID",
        "id": "24962"
      },
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "db": "PACKETSTORM",
        "id": "57869"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-27287",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-3925",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "24962",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "26123",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-2574",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1018419",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153",
        "trust": 0.8
      },
      {
        "db": "IDEFENSE",
        "id": "20070718 IPSWITCH IMAIL SERVER 2006 IMAP SEARCH COMMAND BUFFER OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "35496",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "35500",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387",
        "trust": 0.6
      },
      {
        "db": "ZDI",
        "id": "ZDI-07-042",
        "trust": 0.3
      },
      {
        "db": "ZDI",
        "id": "ZDI-07-043",
        "trust": 0.3
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-71001",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16487",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "4223",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "83090",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-27287",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "57869",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "db": "BID",
        "id": "24962"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "PACKETSTORM",
        "id": "57869"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "id": "VAR-200707-0110",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:28:14.837000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Release notes for IMail Server 2006.21 (v9.21)",
        "trust": 0.8,
        "url": "http://docs.ipswitch.com/IMail%202006.21/ReleaseNotes/IMail_RelNotes.htm#NewRelease"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://docs.ipswitch.com/imail%202006.21/releasenotes/imail_relnotes.htm#newrelease"
      },
      {
        "trust": 1.8,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/24962"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1018419"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26123"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/2574"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35496"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35500"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3925"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3925"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/2574"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/35500"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/35496"
      },
      {
        "trust": 0.3,
        "url": "http://www.ipswitch.com/products/imail_server/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-07-042.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-07-043.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/474040"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/474552"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/474553"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26123/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/8653/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.ipswitch.com/support/imail/releases/im200621.asp"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/8652/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.ipswitch.com/support/ics/updates/ics200621.asp"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "db": "BID",
        "id": "24962"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "PACKETSTORM",
        "id": "57869"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "db": "BID",
        "id": "24962"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "db": "PACKETSTORM",
        "id": "57869"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-07-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "date": "2007-07-18T00:00:00",
        "db": "BID",
        "id": "24962"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "date": "2007-07-20T05:47:25",
        "db": "PACKETSTORM",
        "id": "57869"
      },
      {
        "date": "2007-07-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "date": "2007-07-21T00:30:00",
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-27287"
      },
      {
        "date": "2016-07-05T21:38:00",
        "db": "BID",
        "id": "24962"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      },
      {
        "date": "2007-07-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      },
      {
        "date": "2024-11-21T00:34:23.173000",
        "db": "NVD",
        "id": "CVE-2007-3925"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ipswitch IMail Server 2006 of  imapd32.exe Vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004153"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200707-387"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…