First published: Mon Jul 15 2024(Updated: )
The SMTP Listener of Secure Email Gateway from Cellopoint does not properly validate user input, leading to a Buffer Overflow vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the remote server.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Cellopoint Secure Email Gateway | <4.5.0 |
Install the patch Build_20240529 or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6744 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-6744, update the Secure Email Gateway to version 4.5.0 or later.
CVE-2024-6744 affects all versions of the Secure Email Gateway from Cellopoint prior to 4.5.0.
An attacker can exploit CVE-2024-6744 to execute arbitrary system commands on the remote server.
No, CVE-2024-6744 can be exploited by unauthenticated remote attackers.