| CVE ID | CVE-2007-2795 |
| CVSS SCORE | |
| AFFECTED VENDORS |
Ipswitch |
| AFFECTED PRODUCTS |
IMail |
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['2068']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
| VULNERABILITY DETAILS |
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Ipswitch IMail and ICS server. Authentication is required to exploit this vulnerability. The specific flaw exists due to a lack of bounds checking during the |
| ADDITIONAL DETAILS |
Ipswitch has issued an update to correct this vulnerability. More details can be found at:
http://www.ipswitch.com/support/imail/releases/im200621.asp |
| DISCLOSURE TIMELINE |
|
| CREDIT | Sebastian Apelt (webmaster@buzzworld.org) |