[] NeoSense

Surgemail and WebMail 3.0 - 'Page' Remote Format String

Author: Luigi Auriemma
type: dos
platform: windows
port: 
date_added: 2008-02-25 
date_updated: 2014-02-05 
verified: 1 
codes: CVE-2008-1055;OSVDB-42981 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/27990/info

SurgeMail and WebMail are prone to a remote format-string vulnerability because the applications fail to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.

A remote attacker may execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial of service.

This issue affects the following:

SurgeMail 38k4, beta 39a and earlier
Netwin WebMail 3.1s and earlier

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip