http://www.securityfocus.com/archive/1/474040/30/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-07-042.html
http://www.zerodayinitiative.com/advisories/ZDI-07-043.html
http://archives.neohapsis.com/archives/bugtraq/2007-07/0276.html
http://archives.neohapsis.com/archives/bugtraq/2007-07/0278.html
http://www.ipswitch.com/support/imail/releases/im200621.asp
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563
Severity: Medium
ID: 4141
Family: SMTP Servers
Published: 7/19/2007
Updated: 3/6/2019
Nessus ID: 25737
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 5.8
Temporal Score: 4.8
Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P
Risk Factor: Medium
Base Score: 6.3
Temporal Score: 5.9
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:ipswitch:imail_server
Metasploit (Ipswitch IMail IMAP SEARCH Buffer Overflow)
CVE: CVE-2007-3925, CVE-2007-3927
BID: 24962