CommuniGate Pro HTTP Configuration Port Remote Overflow

High Nessus Plugin ID 10048


The remote service has a buffer overflow vulnerability.


The remote host appears to be running Communigate Pro, a commercial email and groupware application.

It was possible to crash this service by :

- First, connecting to port 8010 and sending 70 KB of data (AAA[...]AAA) followed by '\r\n'.

- Then, connecting to port 25.

A remote attacker could exploit this to crash the service, or possibly execute arbitrary code.


Upgrade to Communigate Pro version 3.2 or later.

See Also

Plugin Details

Severity: High

ID: 10048

File Name: communigatepro_overflow.nasl

Version: 1.37

Type: remote

Family: Web Servers

Published: 1999/12/04

Updated: 2018/11/15

Dependencies: 10582, 17975

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:communigate:communigate_pro_core_server

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1999/12/02

Reference Information

CVE: CVE-1999-0865

BID: 860