First published: Sat Jul 21 2007(Updated: )
Multiple buffer overflows in Ipswitch IMail Server 2006 before 2006.21 (1) allow remote attackers to execute arbitrary code via unspecified vectors in Imailsec and (2) allow attackers to have an unknown impact via an unspecified vector related to "subscribe."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch IMail Secure Server | <=2006.2 | |
Ipswitch Ipswitch Collaboration Suite | <=2006.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3927 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2007-3927, upgrade Ipswitch IMail Server to version 2006.21 or later.
CVE-2007-3927 affects Ipswitch IMail Server 2006 before version 2006.21 and Ipswitch Collaboration Suite 2006 before version 2006.21.
CVE-2007-3927 can allow remote attackers to execute arbitrary code and potentially compromise system integrity.
Yes, there are known exploits that target the buffer overflow vulnerabilities identified in CVE-2007-3927.