CVE-2007-3897
 
Severity Score
9.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption.
Un desbordamiento de búfer en la región heap de la memoria en Microsoft Outlook Express versión 6 y anteriores, y Windows Mail para Vista, permite que los servidores remotos de Network News Transfer Protocol (NNTP) ejecuten código arbitrario por medio de las respuestas NNTP largas que desencadenan una corrupción de la memoria.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-07-19 CVE Reserved
- 2007-10-09 CVE Published
- 2024-08-07 CVE Updated
- 2024-09-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=607 | Broken Link | |
http://secunia.com/advisories/27112 | Third Party Advisory | |
http://securitytracker.com/id?1018785 | Third Party Advisory | |
http://securitytracker.com/id?1018786 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/481983/100/100/threaded | Mailing List | |
http://www.securityfocus.com/bid/25908 | Third Party Advisory | |
http://www.us-cert.gov/cas/techalerts/TA07-282A.html | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1706 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-056 | 2019-10-09 |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/archive/1/482366/100/0/threaded | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Outlook Express Search vendor "Microsoft" for product "Outlook Express" | <= 6.0 Search vendor "Microsoft" for product "Outlook Express" and version " <= 6.0" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Outlook Express Search vendor "Microsoft" for product "Outlook Express" | 6.0 Search vendor "Microsoft" for product "Outlook Express" and version "6.0" | sp1 |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Windows Mail Search vendor "Microsoft" for product "Windows Mail" | - | vista |
Affected
|