// For flags

CVE-2007-3796

 

Severity Score

7.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a large amount of trailing whitespace followed by a malicious value, which triggers SQL buffer truncation due to length inconsistencies between variables.

La característica de reinicio de la contraseña en el interface Spam Quarantine HTTP para SMTP 6.2.0.x anterior 6.2.1 permite a atacantes remotos modificar cuentas de información de su elección a través de un UserId variable con una gran cantidad de espacios en blanco seguidos por un valor malicioso, el cual dispara un truncamiento SQL de búfer debido a las inconsistencias de la longitud entre las variables.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-07-16 CVE Reserved
  • 2007-07-17 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mailmarshal
Search vendor "Mailmarshal"
Mailmarshal Smtp
Search vendor "Mailmarshal" for product "Mailmarshal Smtp"
<= 6.2.0
Search vendor "Mailmarshal" for product "Mailmarshal Smtp" and version " <= 6.2.0"
-
Affected