This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Netwin First view 2008-02-27
Product Surgemail Last view 2011-01-07
Version 2.2c10 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:netwin:surgemail

Activity : Overall

Related : CVE

  Date Alert Description
4.3 2011-01-07 CVE-2010-3201

Cross-site scripting (XSS) vulnerability in NetWin Surgemail before 4.3g allows remote attackers to inject arbitrary web script or HTML via the username_ex parameter to the surgeweb program.

5 2008-06-25 CVE-2008-2859

Unspecified vulnerability in the IMAP service in NetWin SurgeMail before 3.9g2 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors related to an "imap command."

9 2008-03-25 CVE-2008-1498

Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command.

9 2008-03-25 CVE-2008-1497

Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command.

7.5 2008-02-27 CVE-2008-1055

Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.

6.4 2008-02-27 CVE-2008-1054

Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables. NOTE: some of these details are obtained from third party information.

CWE : Common Weakness Enumeration

%idName
60% (3) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
20% (1) CWE-134 Uncontrolled Format String
20% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')

Open Source Vulnerability Database (OSVDB)

id Description
68323 SurgeMail SurgeWeb /surgeweb username_ex Parameter XSS
46434 SurgeMail IMAP APPEND Command Handling Unspecified DoS
43853 SurgeMail IMAP Service LIST Command Argument Handling Remote Overflow
43852 SurgeMail IMAP Service LSUB Command Argument Handling Remote Overflow
42981 SurgeMail webmail.exe page Variable Remote Format String
42980 SurgeMail _lib_spawn_user_getpid Function HTTP Header Processing Overflow

OpenVAS Exploits

id Description
2011-01-18 Name : SurgeMail SurgeWeb Cross Site Scripting Vulnerability
File : nvt/gb_surgemail_surgeweb_xss_vuln.nasl
2010-10-05 Name : SurgeMail SurgeWeb Cross Site Scripting Vulnerability
File : nvt/gb_surgemail_43679.nasl

Snort® IPS/IDS

Date Description
2014-01-10 SurgeMail webmail.exe page format string exploit attempt
RuleID : 21609 - Type : SERVER-WEBAPP - Revision : 6

Nessus® Vulnerability Scanner

id Description
2010-10-04 Name: The remote web server is affected by a cross-site scripting vulnerability.
File: surgemail_surgeweb_xss.nasl - Type: ACT_ATTACK
2008-06-30 Name: The remote mail server is prone to denial of service attacks.
File: surgemail_imap_command_unspecified_dos.nasl - Type: ACT_GATHER_INFO