First published: Fri Mar 23 2007(Updated: )
Multiple buffer overflows in the IMAILAPILib ActiveX control (IMailAPI.dll) in Ipswitch IMail Server before 2006.2 allow remote attackers to execute arbitrary code via the (1) WebConnect and (2) Connect members in the (a) IMailServer control; (3) Sync3 and (4) Init3 members in the (b) IMailLDAPService control; and the (5) SetReplyTo member in the (c) IMailUserCollection control.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch IMail | =2006 | |
Ipswitch IMail Plus | =2006 | |
Ipswitch IMail Premium | =2006 | |
Ipswitch Ipswitch Collaboration Suite | =2006_standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1637 is considered a critical vulnerability as it allows remote attackers to execute arbitrary code on affected systems.
To fix CVE-2007-1637, update the Ipswitch IMail Server to the latest version that addresses this vulnerability.
CVE-2007-1637 affects Ipswitch IMail Server, IMail Plus, IMail Premium, and Ipswitch Collaboration Suite all running version 2006.
CVE-2007-1637 is a buffer overflow vulnerability in the IMAILAPILib ActiveX control.
Yes, CVE-2007-1637 can be exploited remotely, allowing attackers to execute arbitrary code from afar.