How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote mail server is susceptible to multiple issues.
The installation of NetWin DMail on the remote host suffers from an
authentication bypass vulnerability in its mailing list server
component, DList, and a format string vulnerability in the SMTP server
component, DSmtp. An attacker can exploit the first to reveal
potentially sensitive log information as well as to shut down the
DList process and, provided he has the admin password, the second to
crash the DSmtp process and potentially execute arbitrary code on the
Block access to the affected port with a firewall.
Risk factor :
Medium / CVSS Base Score : 6.0
CVSS Temporal Score : 6.0
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 18200 (dmail_2vulns.nasl)
Bugtraq ID: 1349713505
CVE ID: CVE-2005-1478CVE-2005-1516
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.