First published: Wed Feb 27 2008(Updated: )
Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetWin SurgeMail | =3.0c2 | |
NetWin SurgeMail | =2.2a6 | |
NetWin SurgeMail | =1.8e | |
NetWin SurgeMail | =39a | |
NetWin SurgeMail | =2.0g2 | |
NetWin SurgeMail | =2.0e | |
NetWin SurgeMail | =2.1a | |
NetWin SurgeMail | =beta_39a | |
NetWin SurgeMail | =2.0c | |
NetWin SurgeMail | =2.2g2 | |
NetWin SurgeMail | <=38k4 | |
NetWin SurgeMail | =2.2c10 | |
NetWin SurgeMail | =2.2g3 | |
NetWin SurgeMail | =1.8d | |
NetWin SurgeMail | =1.8b3 | |
NetWin SurgeMail | =2.2c9 | |
NetWin SurgeMail | =1.8g3 | |
NetWin SurgeMail | =1.8a | |
NetWin SurgeMail | =1.9 | |
NetWin SurgeMail | =2.0a2 | |
NetWin SurgeMail | =2.1c7 | |
NetWin SurgeMail | =3.8f3 | |
NetWin Webmail | <=3.1s | |
NetWin SurgeMail | =1.9b2 | |
NetWin SurgeMail | =3.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.