Format string vulnerability in webmail.exe in NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in the page parameter.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://securityreason.com/securityalert/3705 | third party advisory |
http://aluigi.altervista.org/adv/surgemailz-adv.txt | |
http://secunia.com/advisories/29137 | third party advisory |
http://secunia.com/advisories/29105 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2008/0678 | vdb entry |
http://www.securitytracker.com/id?1019500 | vdb entry |
http://www.securityfocus.com/archive/1/488741/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40833 | vdb entry |
http://www.securityfocus.com/bid/27990 | vdb entry exploit |