This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.
EasyMail Objects, a set of COM objects for supporting email
protocols, is installed on the remote Windows host. It may have been
bundled with a third-party application, such as Oracle Document
Capture, Earthlink internet access software, Borland Caliber RM
Client, and FrontRange Heat.
The SMTP component of the version of this control installed on the
remote host reportedly contains multiple buffer overflows involving
the AddAttachment and SubmitToExpress methods that could lead to
arbitrary code execution on the affected system. Successful
exploitation requires, though, that an attacker trick a user on the
affected host into visiting a specially crafted web page.
See also :
Either disable its use from within Internet Explorer by setting its
kill bit or remove it completely.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.4
Public Exploit Available : true