Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-4607 | First vendor Publication | 2007-08-30 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer overflow in the EasyMailSMTPObj ActiveX control in emsmtp.dll 6.0.1 in the Quiksoft EasyMail SMTP Object, as used in Postcast Server Pro 3.0.61 and other products, allows remote attackers to execute arbitrary code via a long argument to the SubmitToExpress method, a different vulnerability than CVE-2007-1029. NOTE: this may have been fixed in version 6.0.3.15. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4607 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2007-09-23 | EasyMail MessagePrinter Object (emprint.DLL 6.0.1.0) BOF Exploit |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
38335 | EasyMail Objects EasyMailSMTPObj ActiveX (emsmtp.dll) SubmitToExpress Method ... EasyMail Objects is prone to an overflow condition. The EasyMailSMTPObj ActiveX control fails to properly sanitize user-supplied input to the SubmitTo Express method resulting in a stack overflow. With a specially crafted website, a context-dependent attacker can potentially cause arbitrary code execution. |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-14 | Oracle EasyMail Objects ActiveX clsid access attempt RuleID : 52470 - Revision : 1 - Type : BROWSER-PLUGINS |
2020-01-14 | Oracle EasyMail Objects ActiveX clsid access attempt RuleID : 52469 - Revision : 1 - Type : BROWSER-PLUGINS |
2020-01-14 | Oracle EasyMail Objects ActiveX clsid access attempt RuleID : 52468 - Revision : 1 - Type : BROWSER-PLUGINS |
2020-01-14 | Oracle EasyMail Objects ActiveX clsid access attempt RuleID : 52467 - Revision : 1 - Type : BROWSER-PLUGINS |
2014-01-10 | EasyMail IMAP4 ActiveX function call unicode access RuleID : 16782 - Revision : 3 - Type : WEB-ACTIVEX |
2014-01-10 | EasyMail IMAP4 ActiveX function call access RuleID : 16781 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-01-10 | EasyMail IMAP4 ActiveX clsid unicode access RuleID : 16780 - Revision : 3 - Type : WEB-ACTIVEX |
2014-01-10 | EasyMail IMAP4 ActiveX clsid access RuleID : 16779 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Works WkImgSrv.dll ActiveX clsid access attempt RuleID : 16741 - Revision : 6 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle EasyMail Objects ActiveX exploit attempt RuleID : 16591 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Oracle EasyMail Objects ActiveX exploit attempt RuleID : 16590 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | EasyMail Objects ActiveX clsid unicode access RuleID : 12383 - Revision : 4 - Type : WEB-ACTIVEX |
2014-01-10 | Oracle EasyMail Objects ActiveX clsid access RuleID : 12382 - Revision : 9 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-09-25 | Name : The remote Windows host has an ActiveX control that is affected by multiple b... File : easymail_objects_smtp_activex_overflows.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:16:25 |
|
2024-11-28 12:13:21 |
|
2021-05-04 12:06:20 |
|
2021-04-22 01:06:52 |
|
2020-05-23 13:16:49 |
|
2020-05-23 00:20:22 |
|
2018-08-28 21:20:09 |
|
2017-09-29 09:23:11 |
|
2017-07-29 12:02:29 |
|
2016-06-28 16:52:20 |
|
2016-04-26 16:32:38 |
|
2014-02-17 10:41:30 |
|
2014-01-19 21:24:24 |
|
2013-12-13 13:18:45 |
|
2013-05-11 10:35:12 |
|