EasyMail SMTP Object ActiveX Control Multiple Buffer Overflows

This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.

Description :

EasyMail Objects, a set of COM objects for supporting email
protocols, is installed on the remote Windows host. It may have been
bundled with a third-party application, such as Oracle Document
Capture, Earthlink internet access software, Borland Caliber RM
Client, and FrontRange Heat.

The SMTP component of the version of this control installed on the
remote host reportedly contains multiple buffer overflows involving
the AddAttachment and SubmitToExpress methods that could lead to
arbitrary code execution on the affected system. Successful
exploitation requires, though, that an attacker trick a user on the
affected host into visiting a specially crafted web page.

See also :

http://www.securityfocus.com/archive/1/526440/30/0/threaded

Solution :

Either disable its use from within Internet Explorer by setting its
kill bit or remove it completely.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.4
(CVSS2#E:F/RL:W/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 26185 (easymail_objects_smtp_activex_overflows.nasl)

Bugtraq ID: 25467
36440

CVE ID: CVE-2007-4607
CVE-2009-4663

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now