Description
Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line.
Exploits
References
cve@mitre.org
http://osvdb.org/39390cve@mitre.org
http://www.securityfocus.com/bid/25762cve@mitre.org
https://www.exploit-db.com/exploits/4438af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/39390af854a3a-2127-422b-91ae-364da2661108
http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25762af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/36723af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/4438