6.4
CVSSv2

CVE-2008-1054

Published: 27/02/2008 Updated: 11/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and previous versions, and beta 39a, allows remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

netwin surgemail 1.8g3

netwin surgemail 1.9

netwin surgemail 1.9b2

netwin surgemail 2.2a6

netwin surgemail 2.2c10

netwin surgemail 3.8f3

netwin surgemail 3.8i

netwin surgemail 2.0a2

netwin surgemail 2.0c

netwin surgemail 2.2c9

netwin surgemail 2.2g2

netwin surgemail 3.8i2

netwin surgemail 3.8i3

netwin surgemail 1.8a

netwin surgemail 1.8b3

netwin surgemail 2.0e

netwin surgemail 2.0g2

netwin surgemail 2.2g3

netwin surgemail 3.0a

netwin surgemail 38k

netwin surgemail 38k4

netwin surgemail 1.8d

netwin surgemail 1.8e

netwin surgemail 2.1a

netwin surgemail 2.1c7

netwin surgemail 3.0c2

netwin surgemail 3.1s

Exploits

source: wwwsecurityfocuscom/bid/27992/info SurgeMail is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the affected service Failed exploit attempts likely result i ...