Vulnerabilities > CVE-2007-1029 - Unspecified vulnerability in Quicksoft Easymail Objects
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the Connect method in the IMAP4 component in Quiksoft EasyMail Objects before 6.5 allows remote attackers to execute arbitrary code via a long host name.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | EasyMail Objects 6.x Connect Method Remote Stack Buffer Overflow Vulnerability. CVE-2007-1029. Dos exploit for windows platform |
id | EDB-ID:29607 |
last seen | 2016-02-03 |
modified | 2007-02-02 |
published | 2007-02-02 |
reporter | Paul Craig |
source | https://www.exploit-db.com/download/29607/ |
title | EasyMail Objects 6.x Connect Method Remote Stack Buffer Overflow Vulnerability |
Nessus
NASL family | Windows |
NASL id | EASYMAIL_OBJECTS_IMAP_CONNECT_OVERFLOW.NASL |
description | EasyMail Objects, a set of COM objects for supporting email protocols, is installed on the remote Windows host. The IMAP4 component of the version of the DjVu Browser Plug-in installed on the remote host reportedly is affected by a stack buffer overflow in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24355 |
published | 2007-02-16 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24355 |
title | EasyMail Objects IMAP4 Component Connect Method Remote Overflow |
code |
|
References
- http://secunia.com/advisories/24199
- http://secunia.com/advisories/24199
- http://security-assessment.com/files/advisories/easymail_advisory.pdf
- http://security-assessment.com/files/advisories/easymail_advisory.pdf
- http://securityreason.com/securityalert/2277
- http://securityreason.com/securityalert/2277
- http://www.osvdb.org/33208
- http://www.osvdb.org/33208
- http://www.securityfocus.com/archive/1/460237/100/0/threaded
- http://www.securityfocus.com/archive/1/460237/100/0/threaded
- http://www.securityfocus.com/bid/22583
- http://www.securityfocus.com/bid/22583
- http://www.vupen.com/english/advisories/2007/0634
- http://www.vupen.com/english/advisories/2007/0634
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32540
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32540