|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> EasyMail Object Connect Method Buffer Overflow Vulnerability Vulnerability Assessment Details
|
EasyMail Object Connect Method Buffer Overflow Vulnerability |
||
Checks version of EasyMail Objects Detailed Explanation for this Vulnerability Assessment Summary : A COM object on the remote Windows host is affected by a buffer overflow vulnerability. Description : EasyMail Objects, a set of COM objects for supporting email protocols, is installed on the remote Windows host. The IMAP4 component of the version of the DjVu Browser Plug-in installed on the remote host reportedly is affected by a stack buffer overflow in the 'Connect' method that can be triggered with a 500+ character hostname. A possible hacker may be able to leverage this issue to execute arbitrary code on the remote host subject to the user's rights. See also : http://www.security-assessment.com/files/advisories/easymail_advisory.pdf http://www.securityfocus.com/archive/1/460237/30/0/threaded Solution : Upgrade to EasyMail Objects 6.5 or later as that is rumoured to fix the issue. Network Security Threat Level: High / CVSS Base Score : 8.0 (AV:R/AC:H/Au:NR/C:C/I:C/A:C/B:N) Networks Security ID: 22583 Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |