First published: Wed Mar 21 2007(Updated: )
Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atrium Software Mercur Imapd | =5.00.14-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1578 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2007-1578, upgrade Atrium MERCUR IMAPD to a version later than 5.00.14 with SP4.
CVE-2007-1578 specifically affects Atrium Software MERCUR IMAPD version 5.00.14 with Service Pack 4.
Yes, CVE-2007-1578 can lead to arbitrary code execution, potentially causing data breaches.
CVE-2007-1578 can be exploited through a stack-based buffer overflow via a long NTLMSSP argument.