XtraMail Control Service Username Overflow

high Nessus Plugin ID 10323

Synopsis

The remote host is running a mail server with a remote buffer overflow vulnerability.

Description

The remote host is running a version of XtraMail with a remote buffer overflow vulnerability. XtraMail includes a remote administration utility which listens on port 32000 for logins. Providing a username of over 15,000 characters causes a buffer overflow, which could allow a remote attacker to crash the service or potentially execute arbitrary code.

Solution

Upgrade to the latest version of the software.

See Also

https://seclists.org/bugtraq/1999/Nov/128

Plugin Details

Severity: High

ID: 10323

File Name: xtramail_control.nasl

Version: 1.36

Type: remote

Family: Misc.

Published: 11/10/1999

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 11/10/1999

Reference Information

CVE: CVE-1999-1511

BID: 791