Vulnerability Details : CVE-2007-3771
Stack-based buffer overflow in the Internet E-mail Auto-Protect feature in Symantec AntiVirus Corporate Edition before 10.1, and Client Security before 3.1, allows local users to cause a denial of service (service crash) via a long (1) To, (2) From, or (3) Subject header in an outbound SMTP e-mail message. NOTE: the original vendor advisory referenced CVE-2006-3456, but this was an error.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2007-3771
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-3771
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:S/C:N/I:N/A:C |
3.1
|
6.9
|
NIST |
References for CVE-2007-3771
- http://www.vupen.com/english/advisories/2007/2506
-
http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11b.html
-
http://securitytracker.com/id?1018367
-
http://www.securityfocus.com/bid/24802
-
http://securitytracker.com/id?1018371
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35354
Products affected by CVE-2007-3771
- cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*