语言:
http://www.nessus.org/u?194eb0fd
https://www.securityfocus.com/archive/1/474040/30/0/threaded
https://www.zerodayinitiative.com/advisories/ZDI-07-042/
https://www.zerodayinitiative.com/advisories/ZDI-07-043/
https://seclists.org/bugtraq/2007/Jul/275
严重性: Critical
ID: 25737
文件名: ipswitch_imail_2006_21.nasl
版本: 1.27
类型: remote
代理: windows
系列: Windows
发布时间: 2007/7/19
最近更新时间: 2022/4/11
配置: 启用全面检查
支持的传感器: Nessus
风险因素: High
分数: 7.4
风险因素: Critical
基本分数: 10
时间分数: 8.3
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/a:ipswitch:imail
可利用: true
易利用性: Exploits are available
补丁发布日期: 2007/7/19
漏洞发布日期: 2007/3/9
Core Impact
Metasploit (Ipswitch IMail IMAP SEARCH Buffer Overflow)
CVE: CVE-2007-2795, CVE-2007-3925, CVE-2007-3926, CVE-2007-3927
BID: 24962
CWE: 119