ID

VAR-200710-0011


CVE

CVE-2007-4345


TITLE

IPSwitch IMail Server Bundled with IMail Client Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2007-004277

DESCRIPTION

Buffer overflow in IMail Client 9.22, as shipped with IPSwitch IMail Server 2006.22, allows remote attackers to execute arbitrary code via a long boundary parameter in a multipart MIME e-mail message. IMail Client, which is included in Ipswitch IMail Server, is prone to a buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer. Attackers may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects IMail Client 9.22, which is included with IMail Server 2006.22; other versions may also be affected. IPSwitch IMail is a Windows-based mail service program. ====================================================================== 2) Severity Rating: Moderately critical Impact: Denial of Service System compromise Where: Remote ====================================================================== 3) Vendor's Description of Software The IMail Client "is provided for those who are administering IMail Server on the NT workstation on which IMail Server is installed. It is useful for reading the 'root' mailbox, working with seldom-used accounts, and testing.". Product Link: http://www.ipswitch.com/purchase/products/imail_server.asp ====================================================================== 4) Description of Vulnerability Secunia Research has discovered a vulnerability in the IMail Client, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the IMail Client when processing emails containing multipart MIME data. ====================================================================== 5) Solution The vendor recommends users to delete the IMail Client application, which will be removed from the next major release of the IPSwitch IMail Server. ====================================================================== 6) Time Table 24/09/2007 - Vendor notified. 25/09/2007 - Vendor response. 30/10/2007 - Public disclosure. ====================================================================== 7) Credits Discovered by Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2007-4345 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://corporate.secunia.com/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://corporate.secunia.com/secunia_research/33/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/secunia_vacancies/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2007-81/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== . ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Successful exploitation may allow execution of arbitrary code. PROVIDED AND/OR DISCOVERED BY: Secunia Research ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2007-81/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2007-4345 // JVNDB: JVNDB-2007-004277 // BID: 26252 // VULHUB: VHN-27707 // PACKETSTORM: 60527 // PACKETSTORM: 60534

AFFECTED PRODUCTS

vendor:ipswitchmodel:imail clientscope:eqversion:9.22

Trust: 2.7

vendor:ipswitchmodel:imail serverscope:eqversion:2006.22

Trust: 2.4

sources: BID: 26252 // JVNDB: JVNDB-2007-004277 // CNNVD: CNNVD-200710-552 // NVD: CVE-2007-4345

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4345
value: HIGH

Trust: 1.0

NVD: CVE-2007-4345
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200710-552
value: HIGH

Trust: 0.6

VULHUB: VHN-27707
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4345
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27707
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27707 // JVNDB: JVNDB-2007-004277 // CNNVD: CNNVD-200710-552 // NVD: CVE-2007-4345

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-27707 // JVNDB: JVNDB-2007-004277 // NVD: CVE-2007-4345

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200710-552

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200710-552

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004277

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27707

PATCH

title:IMail Serverurl:http://www.imailserver.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-004277

EXTERNAL IDS

db:NVDid:CVE-2007-4345

Trust: 2.9

db:BIDid:26252

Trust: 2.0

db:SECUNIAid:26905

Trust: 1.8

db:VUPENid:ADV-2007-3659

Trust: 1.7

db:JVNDBid:JVNDB-2007-004277

Trust: 0.8

db:XFid:38151

Trust: 0.6

db:CNNVDid:CNNVD-200710-552

Trust: 0.6

db:PACKETSTORMid:60527

Trust: 0.2

db:VULHUBid:VHN-27707

Trust: 0.1

db:PACKETSTORMid:60534

Trust: 0.1

sources: VULHUB: VHN-27707 // BID: 26252 // JVNDB: JVNDB-2007-004277 // PACKETSTORM: 60527 // PACKETSTORM: 60534 // CNNVD: CNNVD-200710-552 // NVD: CVE-2007-4345

REFERENCES

url:http://www.securityfocus.com/bid/26252

Trust: 1.7

url:http://secunia.com/secunia_research/2007-81/advisory/

Trust: 1.7

url:http://secunia.com/advisories/26905

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3659

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38151

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4345

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4345

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/38151

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/3659

Trust: 0.6

url:http://secunia.com/secunia_research/2007-81/

Trust: 0.5

url:http://www.ipswitch.com/products/imail_server/index.html

Trust: 0.3

url:/archive/1/482988

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://corporate.secunia.com/secunia_research/33/

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://corporate.secunia.com/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-4345

Trust: 0.1

url:http://www.ipswitch.com/purchase/products/imail_server.asp

Trust: 0.1

url:http://secunia.com/product/8653/

Trust: 0.1

url:http://secunia.com/advisories/26905/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27707 // BID: 26252 // JVNDB: JVNDB-2007-004277 // PACKETSTORM: 60527 // PACKETSTORM: 60534 // CNNVD: CNNVD-200710-552 // NVD: CVE-2007-4345

CREDITS

Secunia

Trust: 0.7

sources: PACKETSTORM: 60534 // CNNVD: CNNVD-200710-552

SOURCES

db:VULHUBid:VHN-27707
db:BIDid:26252
db:JVNDBid:JVNDB-2007-004277
db:PACKETSTORMid:60527
db:PACKETSTORMid:60534
db:CNNVDid:CNNVD-200710-552
db:NVDid:CVE-2007-4345

LAST UPDATE DATE

2025-04-10T23:25:03.662000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27707date:2017-07-29T00:00:00
db:BIDid:26252date:2007-10-30T00:00:00
db:JVNDBid:JVNDB-2007-004277date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200710-552date:2007-11-01T00:00:00
db:NVDid:CVE-2007-4345date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27707date:2007-10-31T00:00:00
db:BIDid:26252date:2007-10-30T00:00:00
db:JVNDBid:JVNDB-2007-004277date:2012-09-25T00:00:00
db:PACKETSTORMid:60527date:2007-10-30T16:20:14
db:PACKETSTORMid:60534date:2007-10-30T23:58:14
db:CNNVDid:CNNVD-200710-552date:2007-10-31T00:00:00
db:NVDid:CVE-2007-4345date:2007-10-31T17:46:00