XMail APOP / USER Command Remote Overflow

This script is Copyright (C) 2000-2011 Tenable Network Security, Inc.


Synopsis :

The remote host is running a POP server with a remote root
vulnerability.

Description :

The remote host is running XMail, a POP3 server. The installed version
is subject to a buffer overflow when it receives two arguments that are
too long for the APOP command.

An attacker could exploit this issue to disable the POP server or to
execute arbitrary code as root on the remote host.

See also :

http://archives.neohapsis.com/archives/bugtraq/2000-09/0001.html

Solution :

Contact the vendor for a patch.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 10.0
(CVSS2#E:H/RL:U/RC:ND)

Family: Gain a shell remotely

Nessus Plugin ID: 10559 ()

Bugtraq ID: 1652

CVE ID: CVE-2000-0840
CVE-2000-0841