|
|||
Rule General Information |
---|
Release Date: | 2019-07-06 | |
Rule Name: | NetWin SurgeMail IMAPd LIST Command Denial of Service Vulnerability (CVE-2008-1498) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in the IMAP service in NetWin Surgemail 3.8k4-4 and earlier allows remote authenticated users to execute arbitrary code via a long first argument to the LIST command. | |
Impact: | An attacker can launch a denial of service attack by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:28260 ExploitDB:5259 http://www.netwinsite.com/surgemail/help/updates.htm http://www.vupen.com/english/advisories/2008/0901/references |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://mysupport.mcafee.com/eservice_enu/start.swe |