Vulnerability CVE-2007-3796


Published: 2007-07-17   Modified: 2012-02-12

Description:
The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a large amount of trailing whitespace followed by a malicious value, which triggers SQL buffer truncation due to length inconsistencies between variables.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
MailMarshal Spam Quarantine Password Retrieval Vulnerability
Gary O\'lea...
20.07.2007

CVSS2 => (AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.6/10
10/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Mailmarshal -> Mailmarshal smtp 

 References:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064676.html
http://www.securityfocus.com/bid/24936
http://www.sec-1labs.co.uk/advisories/BTA_Full.pdf
http://secunia.com/advisories/26018
http://securityreason.com/securityalert/2895

Copyright 2024, cxsecurity.com

 

Back to Top