XMail APOP / USER Command Remote Overflow

This script is Copyright (C) 2000-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is running a POP server with a remote root
vulnerability.

Description :

The remote host is running XMail, a POP3 server. The installed version
is subject to a buffer overflow when it receives two arguments that are
too long for the APOP command.

An attacker could exploit this issue to disable the POP server or to
execute arbitrary code as root on the remote host.

See also :

http://seclists.org/bugtraq/2000/Sep/138

Solution :

Contact the vendor for a patch.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 10.0
(CVSS2#E:H/RL:U/RC:ND)

Family: Gain a shell remotely

Nessus Plugin ID: 10559 ()

Bugtraq ID: 1652

CVE ID: CVE-2000-0840
CVE-2000-0841

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now