Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-3796
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-17 Jul, 2007 | 23:30
Updated At-14 Feb, 2024 | 01:17

The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a large amount of trailing whitespace followed by a malicious value, which triggers SQL buffer truncation due to length inconsistencies between variables.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.6HIGH
AV:N/AC:H/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 7.6
Base severity: HIGH
Vector:
AV:N/AC:H/Au:N/C:C/I:C/A:C
CPE Matches

mailmarshal
mailmarshal
>>mailmarshal_smtp>>Versions up to 6.2.0(inclusive)
cpe:2.3:a:mailmarshal:mailmarshal_smtp:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

"Successful exploitation requires that the attacker knows the email address of the target user."

Evaluator Solution

The vendor has released version 6.2.1 to address this issue.

Vendor Statements

References
HyperlinkSourceResource
http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064676.htmlcve@mitre.org
Patch
http://secunia.com/advisories/26018cve@mitre.org
Vendor Advisory
http://securityreason.com/securityalert/2895cve@mitre.org
N/A
http://www.sec-1labs.co.uk/advisories/BTA_Full.pdfcve@mitre.org
URL Repurposed
http://www.securityfocus.com/bid/24936cve@mitre.org
N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064676.html
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://secunia.com/advisories/26018
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://securityreason.com/securityalert/2895
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.sec-1labs.co.uk/advisories/BTA_Full.pdf
Source: cve@mitre.org
Resource:
URL Repurposed
Hyperlink: http://www.securityfocus.com/bid/24936
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found