CVE-2007-1578 – Mercur IMAPD 5.00.14 (Windows x86) - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-1578
Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow. Múltiples errores de presencia de signo en entero en la implementación NTLM en Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, con SP4, permite a atacantes remotos ejecutar código de su elección a través del argumento NTLMSSP que dispara un desbordamiento de búfer basado en pila. • https://www.exploit-db.com/exploits/3527 http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0280.html http://secunia.com/advisories/24596 http://securitytracker.com/id?1017798 http://www.digit-labs.org/files/exploits/mercur-v1.pl http://www.osvdb.org/33545 http://www.securityfocus.com/bid/23058 http://www.vupen.com/english/advisories/2007/1053 https://exchange.xforce.ibmcloud.com/vulnerabilities/33120 •
CVE-2007-1579 – Mercur Messaging 2005 (Windows 2000 SP4) - IMAP 'Subscribe' Remote Overflow
https://notcve.org/view.php?id=CVE-2007-1579
Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command. Un desbordamiento de búfer en la región heap de la memoria en Atrium MERCUR IMAPD, permite a atacantes remotos tener un impacto desconocido por medio de un cierto comando SUBSCRIBE. • https://www.exploit-db.com/exploits/3537 http://secunia.com/advisories/24619 http://www.immunitysec.com/partners-index.shtml http://www.osvdb.org/33546 http://www.securityfocus.com/bid/23050 http://www.vupen.com/english/advisories/2007/1092 https://exchange.xforce.ibmcloud.com/vulnerabilities/33216 https://www.immunityinc.com/downloads/immpartners/MercurImapSubscribe.tar • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •