XMail < 0.59 APOP Overflow DoS

critical Nessus Network Monitor Plugin ID 1800

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote XMail POP server is vulnerable to a buffer overflow when it receives two long arguments for the APOP command. This problem may allow an attacker to disable this POP server remotely or even to execute arbitrary commands with its privileges (typically, root).

Solution

Upgrade to XMail 0.59 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2000-09/0001.html

Plugin Details

Severity: Critical

ID: 1800

Family: POP Server

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 10559

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:davide_libenzi:xmail

Reference Information

CVE: CVE-2000-0840, CVE-2000-0841

BID: 1652