CVE编号
CVE-2006-0447利用情况
暂无补丁情况
N/A披露时间
2006-01-27漏洞描述
Multiple buffer overflows in E-Post Mail Server 4.10 and SPA-PRO Mail @Solomon 4.00 allow remote attackers to execute arbitrary code via a long username to the (1) AUTH PLAIN or (2) AUTH LOGIN SMTP commands, which is not properly handled by (a) EPSTRS.EXE or (b) SPA-RS.EXE; (3) a long username in the APOP POP3 command, which is not properly handled by (c) EPSTPOP4S.EXE or (d) SPA-POP3S.EXE; (4) a long IMAP DELETE command, which is not properly handled by (e) EPSTIMAP4S.EXE or (f) SPA-IMAP4S.EXE.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://secunia.com/advisories/18480 | |
http://secunia.com/secunia_research/2006-1/advisory/ | |
http://www.osvdb.org/22761 | |
http://www.osvdb.org/22762 | |
http://www.osvdb.org/22763 | |
http://www.securityfocus.com/bid/16379 | |
http://www.vupen.com/english/advisories/2006/0318 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24331 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24333 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24334 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | e-post_corporation | mail_server | 4.10 | - | |||||
运行在以下环境 | |||||||||
应用 | e-post_corporation | mail_server | enterprise_4.10 | - | |||||
运行在以下环境 | |||||||||
应用 | e-post_corporation | smtp_server | 4.10 | - | |||||
运行在以下环境 | |||||||||
应用 | e-post_corporation | smtp_server | enterprise_4.10 | - | |||||
运行在以下环境 | |||||||||
应用 | e-post_corporation | spa-pro_mail_atsolomon | 4.00 | - | |||||
运行在以下环境 | |||||||||
应用 | e-post_corporation | spa-pro_mail_atsolomon | enterprise_4.00 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 部分地
- 完整性 部分地
还没有评论,来说两句吧...