MERCUR Messaging IMAP Service Multiple Command Remote Overflow

This script is Copyright (C) 2006-2011 Ferdy Riphagen


Synopsis :

The remote IMAP server is affected by a remote buffer overflow
vulnerability.

Description :

The remote host is running MERCUR Messaging Server / Mailserver, a
commercial messaging application for Windows.

The IMAP server component of this software fails to properly copy
overly-long arguments to LOGIN and SELECT commands, which can be
exploited to crash the server and possibly to execute arbitrary code
remotely.

Note that the services run by default with LOCAL SYSTEM privileges,
which means that an unauthenticated attacker can potentially gain
complete control of the affected host.

See also :

http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/043972.html

Solution :

No patch information at this time.

Filter access to the IMAP4 Service, so that it can be used by trusted
sources only.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 21116 ()

Bugtraq ID: 17138

CVE ID: CVE-2006-1255