MTS Professional < 1.61.1.85 SMTP Open Relay

medium Nessus Network Monitor Plugin ID 3448

Synopsis

The remote SMTP server can be tricked into relaying email, regardless of its relay configuration.

Description

The remote host is running the MTS Professional SMTP server. This version of MTS is vulnerable to a flaw in the way that it handles malformed 'MAIL FROM:' headers. An attacker exploiting this flaw would send malformed 'MAIL FROM:' directives to the server. Successful exploitation would result in the attacker being able to relay traffic through the host.

Solution

Upgrade to version 1.61.1.85 or higher.

See Also

http://www.mtsprofessional.com/index.html

Plugin Details

Severity: Medium

ID: 3448

Family: SMTP Servers

Published: 2/28/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:craig_morrison:mts_pro

Reference Information

CVE: CVE-2006-0977

BID: 16840