First published: Wed Mar 21 2007(Updated: )
Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atrium Software Mercur Messaging 2005 | =5.0_sp3 | |
Atrium Software Mercur Messaging 2005 | =5.0_sp3 | |
Atrium Software Mercur Messaging 2005 | =sp4 | |
Atrium Software Mercur Messaging 2005 | =5.0_sp3 | |
Atrium Software Mercur Imapd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1579 has a high severity rating due to its potential for remote code execution through a stack-based buffer overflow.
To fix CVE-2007-1579, you should upgrade to a patched version of Atrium Software Mercur Messaging that addresses the buffer overflow vulnerability.
CVE-2007-1579 affects Atrium Software Mercur Messaging 2005 versions 5.0 SP3 and SP4, as well as the Mercur IMAPD.
The potential impacts of CVE-2007-1579 include data loss, system compromise, and unauthorized access to sensitive information.
There is no official workaround for CVE-2007-1579, and the best course of action is to upgrade to a secure version.