var-200710-0011
Vulnerability from variot

Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message. IMail Client, which is included in Ipswitch IMail Server, is prone to a buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. Attackers may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects IMail Client 9.22, which is included with IMail Server 2006.22; other versions may also be affected. IPSwitch IMail is a Windows-based mail service program.

====================================================================== 2) Severity

Rating: Moderately critical Impact: Denial of Service System compromise Where: Remote

====================================================================== 3) Vendor's Description of Software

The IMail Client "is provided for those who are administering IMail Server on the NT workstation on which IMail Server is installed. It is useful for reading the 'root' mailbox, working with seldom-used accounts, and testing.".

Product Link: http://www.ipswitch.com/purchase/products/imail_server.asp

====================================================================== 4) Description of Vulnerability

Secunia Research has discovered a vulnerability in the IMail Client, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the IMail Client when processing emails containing multipart MIME data.

====================================================================== 5) Solution

The vendor recommends users to delete the IMail Client application, which will be removed from the next major release of the IPSwitch IMail Server.

====================================================================== 6) Time Table

24/09/2007 - Vendor notified. 25/09/2007 - Vendor response. 30/10/2007 - Public disclosure.

====================================================================== 7) Credits

Discovered by Secunia Research.

====================================================================== 8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2007-4345 for the vulnerability.

====================================================================== 9) About Secunia

Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

====================================================================== 10) Verification

Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2007-81/

Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/

====================================================================== .


2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.

Successful exploitation may allow execution of arbitrary code.

PROVIDED AND/OR DISCOVERED BY: Secunia Research

ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2007-81/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200710-0011",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "imail client",
        "scope": "eq",
        "trust": 2.7,
        "vendor": "ipswitch",
        "version": "9.22"
      },
      {
        "model": "imail server",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "ipswitch",
        "version": "2006.22"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "26252"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:ipswitch:imail_client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:ipswitch:imail_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Secunia",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "60534"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2007-4345",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2007-4345",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-27707",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-4345",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-4345",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200710-552",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-27707",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message. IMail Client, which is included in Ipswitch IMail Server, is prone to a buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. \nAttackers may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. \nThis issue affects IMail Client 9.22, which is included with IMail Server 2006.22; other versions may also be affected. IPSwitch IMail is a Windows-based mail service program. \n\n====================================================================== \n2) Severity \n\nRating: Moderately critical\nImpact: Denial of Service\n        System compromise\nWhere:  Remote\n\n====================================================================== \n3) Vendor\u0027s Description of Software \n\nThe IMail Client \"is provided for those who are administering IMail\nServer on the NT workstation on which IMail Server is installed. It is\nuseful for reading the \u0027root\u0027 mailbox, working with seldom-used\naccounts, and testing.\". \n\nProduct Link:\nhttp://www.ipswitch.com/purchase/products/imail_server.asp\n\n====================================================================== \n4) Description of Vulnerability\n\nSecunia Research has discovered a vulnerability in the IMail Client,\nwhich potentially can be exploited by malicious people to compromise a\nuser\u0027s system. \n\nThe vulnerability is caused due to a boundary error within the IMail\nClient when processing emails containing multipart MIME data. \n\n====================================================================== \n5) Solution \n\nThe vendor recommends users to delete the IMail Client application,\nwhich will be removed from the next major release of the IPSwitch \nIMail Server. \n\n====================================================================== \n6) Time Table \n\n24/09/2007 - Vendor notified. \n25/09/2007 - Vendor response. \n30/10/2007 - Public disclosure. \n\n====================================================================== \n7) Credits \n\nDiscovered by Secunia Research. \n\n====================================================================== \n8) References\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned \nCVE-2007-4345 for the vulnerability. \n\n====================================================================== \n9) About Secunia\n\nSecunia offers vulnerability management solutions to corporate\ncustomers with verified and reliable vulnerability intelligence\nrelevant to their specific system configuration:\n\nhttp://corporate.secunia.com/\n\nSecunia also provides a publicly accessible and comprehensive advisory\ndatabase as a service to the security community and private \nindividuals, who are interested in or concerned about IT-security. \n\nhttp://secunia.com/\n\nSecunia believes that it is important to support the community and to\ndo active vulnerability research in order to aid improving the \nsecurity and reliability of software in general:\n\nhttp://corporate.secunia.com/secunia_research/33/\n\nSecunia regularly hires new skilled team members. Check the URL below\nto see currently vacant positions:\n\nhttp://secunia.com/secunia_vacancies/\n\nSecunia offers a FREE mailing list called Secunia Security Advisories:\n\nhttp://secunia.com/secunia_security_advisories/ \n\n====================================================================== \n10) Verification \n\nPlease verify this advisory by visiting the Secunia website:\nhttp://secunia.com/secunia_research/2007-81/\n\nComplete list of vulnerability reports published by Secunia Research:\nhttp://secunia.com/secunia_research/\n\n======================================================================\n. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nPROVIDED AND/OR DISCOVERED BY:\nSecunia Research\n\nORIGINAL ADVISORY:\nSecunia Research:\nhttp://secunia.com/secunia_research/2007-81/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "BID",
        "id": "26252"
      },
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "db": "PACKETSTORM",
        "id": "60527"
      },
      {
        "db": "PACKETSTORM",
        "id": "60534"
      }
    ],
    "trust": 2.16
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-27707",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-4345",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "26252",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "26905",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-3659",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "38151",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "60527",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-27707",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "60534",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "db": "BID",
        "id": "26252"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "PACKETSTORM",
        "id": "60527"
      },
      {
        "db": "PACKETSTORM",
        "id": "60534"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "id": "VAR-200710-0011",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T23:00:17.435000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "IMail Server",
        "trust": 0.8,
        "url": "http://www.imailserver.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/26252"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/secunia_research/2007-81/advisory/"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/26905"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/3659"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38151"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4345"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4345"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/38151"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/3659"
      },
      {
        "trust": 0.5,
        "url": "http://secunia.com/secunia_research/2007-81/"
      },
      {
        "trust": 0.3,
        "url": "http://www.ipswitch.com/products/imail_server/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/482988"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/secunia_research/33/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_research/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4345"
      },
      {
        "trust": 0.1,
        "url": "http://www.ipswitch.com/purchase/products/imail_server.asp"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/8653/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/26905/"
      },
      {
        "trust": 0.1,
        "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "db": "BID",
        "id": "26252"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "PACKETSTORM",
        "id": "60527"
      },
      {
        "db": "PACKETSTORM",
        "id": "60534"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "db": "BID",
        "id": "26252"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "db": "PACKETSTORM",
        "id": "60527"
      },
      {
        "db": "PACKETSTORM",
        "id": "60534"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-10-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "date": "2007-10-30T00:00:00",
        "db": "BID",
        "id": "26252"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "date": "2007-10-30T16:20:14",
        "db": "PACKETSTORM",
        "id": "60527"
      },
      {
        "date": "2007-10-30T23:58:14",
        "db": "PACKETSTORM",
        "id": "60534"
      },
      {
        "date": "2007-10-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "date": "2007-10-31T17:46:00",
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-27707"
      },
      {
        "date": "2007-10-30T00:00:00",
        "db": "BID",
        "id": "26252"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      },
      {
        "date": "2007-11-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      },
      {
        "date": "2024-11-21T00:35:22.253000",
        "db": "NVD",
        "id": "CVE-2007-4345"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "IPSwitch IMail Server Bundled with  IMail Client Vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004277"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200710-552"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…