SurgeMail IMAP Server SEARCH Command Remote Buffer Overflow

medium Nessus Plugin ID 25929

Synopsis

The remote mail server is affected by a buffer overflow vulnerability.

Description

According to its banner, the remote host is running a version of the SurgeMail Mail Server older than 3.8k2 / 3.8m. Such versions are reportedly affected by a buffer overflow flaw in its IMAP service that can be triggered using a specially crafted 'SEARCH' command. An authenticated attacker can leverage this issue to crash the remote application and possibly execute arbitrary code remotely, subject to the privileges under which the application runs.

Solution

Upgrade to SurgeMail 3.8k2 / 3.8m or later.

See Also

https://seclists.org/fulldisclosure/2007/Aug/239

http://www.nessus.org/u?bb698652

http://www.netwinsite.com/surgemail/help/updates.htm

Plugin Details

Severity: Medium

ID: 25929

File Name: surgemail_imap_search_overflow.nasl

Version: 1.14

Type: remote

Family: Misc.

Published: 8/23/2007

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/14/2007

Reference Information

CVE: CVE-2007-4377

BID: 25318