Lucene search

K
cveMitreCVE-2006-4379
HistorySep 08, 2006 - 9:04 p.m.

CVE-2006-4379

2006-09-0821:04:00
mitre
web.nvd.nist.gov
31
cve-2006-4379
stack-based buffer overflow
remote code execution
ipswitch collaboration 2006 suite
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.7

Confidence

Low

EPSS

0.961

Percentile

99.5%

Stack-based buffer overflow in the SMTP Daemon in Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail Plus, and IMail Secure allows remote attackers to execute arbitrary code via a long string located after an ‘@’ character and before a ‘:’ character.

Affected configurations

Nvd
Node
ipswitchimail_plusMatch2006
OR
ipswitchimail_secure_serverMatch2006
OR
ipswitchipswitch_collaboration_suiteMatch2006_premium
OR
ipswitchipswitch_collaboration_suiteMatch2006_standard
VendorProductVersionCPE
ipswitchimail_plus2006cpe:2.3:a:ipswitch:imail_plus:2006:*:*:*:*:*:*:*
ipswitchimail_secure_server2006cpe:2.3:a:ipswitch:imail_secure_server:2006:*:*:*:*:*:*:*
ipswitchipswitch_collaboration_suite2006_premiumcpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_premium:*:*:*:*:*:*:*
ipswitchipswitch_collaboration_suite2006_standardcpe:2.3:a:ipswitch:ipswitch_collaboration_suite:2006_standard:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.7

Confidence

Low

EPSS

0.961

Percentile

99.5%