CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.7%
Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
Vendor | Product | Version | CPE |
---|---|---|---|
atrium_software | mercur_imapd | * | cpe:2.3:a:atrium_software:mercur_imapd:*:*:*:*:*:*:*:* |
atrium_software | mercur_messaging_2005 | 5.0_sp3 | cpe:2.3:a:atrium_software:mercur_messaging_2005:5.0_sp3:*:enterprise:*:*:*:*:* |
atrium_software | mercur_messaging_2005 | 5.0_sp3 | cpe:2.3:a:atrium_software:mercur_messaging_2005:5.0_sp3:*:lite:*:*:*:*:* |
atrium_software | mercur_messaging_2005 | 5.0_sp3 | cpe:2.3:a:atrium_software:mercur_messaging_2005:5.0_sp3:*:standard:*:*:*:*:* |
atrium_software | mercur_messaging_2005 | sp4 | cpe:2.3:a:atrium_software:mercur_messaging_2005:sp4:*:*:*:*:*:*:* |
secunia.com/advisories/24619
www.immunitysec.com/partners-index.shtml
www.osvdb.org/33546
www.securityfocus.com/bid/23050
www.vupen.com/english/advisories/2007/1092
exchange.xforce.ibmcloud.com/vulnerabilities/33216
www.exploit-db.com/exploits/3537
www.immunityinc.com/downloads/immpartners/MercurImapSubscribe.tar