MDaemon SMTP HELO Command Remote Overflow DoS

high Nessus Plugin ID 10136

Synopsis

The remote mail server may be affected by a buffer overflow vulnerability.

Description

It was possible to crash the remote SMTP server by sending a too long argument to the HELO command. This allows an unauthenticated, remote attacker to deny service to legitimate users of the server.

It may also indicate the service is affected by a buffer overflow vulnerability which, if true, would allow an attacker to execute arbitrary code on the affected host, subject to the privileges under which the service operates.

Solution

Contact the vendor for a fix.

See Also

https://seclists.org/bugtraq/1998/Mar/87

Plugin Details

Severity: High

ID: 10136

File Name: mdaemon.nasl

Version: 1.36

Type: remote

Published: 6/22/1999

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/11/1998

Reference Information

CVE: CVE-1999-0284

BID: 8622, 8555, 8621