### [CVE-2007-5094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5094) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Heap-based buffer overflow in iaspam.dll in the SMTP Server in Ipswitch IMail Server 8.01 through 8.11 allows remote attackers to execute arbitrary code via a set of four different e-mail messages with a long boundary parameter in a certain malformed Content-Type header line, the string "MIME" by itself on a line in the header, and a long Content-Transfer-Encoding header line. ### POC #### Reference - http://pstgroup.blogspot.com/2007/09/exploitimail-iaspamdll-80x-remote-heap.html - https://www.exploit-db.com/exploits/4438 #### Github No PoCs found on GitHub currently.