6.4

CVE-2008-1054

Exploit
Stack-based buffer overflow in the _lib_spawn_user_getpid function in (1) swatch.exe and (2) surgemail.exe in NetWin SurgeMail 38k4 and earlier, and beta 39a, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe and unspecified other CGI executables, which triggers an overflow when assigning values to environment variables.  NOTE: some of these details are obtained from third party information.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NetwinSurgemail Version1.8a
NetwinSurgemail Version1.8b3
NetwinSurgemail Version1.8d
NetwinSurgemail Version1.8e
NetwinSurgemail Version1.8g3
NetwinSurgemail Version1.9
NetwinSurgemail Version1.9b2
NetwinSurgemail Version2.0a2
NetwinSurgemail Version2.0c
NetwinSurgemail Version2.0e
NetwinSurgemail Version2.0g2
NetwinSurgemail Version2.1a
NetwinSurgemail Version2.1c7
NetwinSurgemail Version2.2a6
NetwinSurgemail Version2.2c9
NetwinSurgemail Version2.2c10
NetwinSurgemail Version2.2g2
NetwinSurgemail Version2.2g3
NetwinSurgemail Version3.0a
NetwinSurgemail Version3.0c2
NetwinSurgemail Version3.1s
NetwinSurgemail Version3.8f3
NetwinSurgemail Version3.8i
NetwinSurgemail Version3.8i2
NetwinSurgemail Version3.8i3
NetwinSurgemail Version38k
NetwinSurgemail Version38k4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 19.52% 0.952
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:N/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.