2 results (0.006 seconds)

CVSS: 10.0EPSS: 60%CPEs: 1EXPL: 5

Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow. Múltiples errores de presencia de signo en entero en la implementación NTLM en Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, con SP4, permite a atacantes remotos ejecutar código de su elección a través del argumento NTLMSSP que dispara un desbordamiento de búfer basado en pila. • https://www.exploit-db.com/exploits/3527 http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0280.html http://secunia.com/advisories/24596 http://securitytracker.com/id?1017798 http://www.digit-labs.org/files/exploits/mercur-v1.pl http://www.osvdb.org/33545 http://www.securityfocus.com/bid/23058 http://www.vupen.com/english/advisories/2007/1053 https://exchange.xforce.ibmcloud.com/vulnerabilities/33120 •

CVSS: 10.0EPSS: 55%CPEs: 5EXPL: 1

Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command. Un desbordamiento de búfer en la región heap de la memoria en Atrium MERCUR IMAPD, permite a atacantes remotos tener un impacto desconocido por medio de un cierto comando SUBSCRIBE. • https://www.exploit-db.com/exploits/3537 http://secunia.com/advisories/24619 http://www.immunitysec.com/partners-index.shtml http://www.osvdb.org/33546 http://www.securityfocus.com/bid/23050 http://www.vupen.com/english/advisories/2007/1092 https://exchange.xforce.ibmcloud.com/vulnerabilities/33216 https://www.immunityinc.com/downloads/immpartners/MercurImapSubscribe.tar • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •