Magic Winmail Server PASS Command Remote Format String

High Nessus Plugin ID 11742


The remote mail server is prone to a format string attack.


The remote Winmail POP server, according to its banner, is vulnerable to a format string attack when processing the USER command.

An unauthenticated attacker may use this flaw to execute arbitrary code on this host.


Upgrade to WinMail version 2.4 (Build 0530) or later.

See Also

Plugin Details

Severity: High

ID: 11742

File Name: magic_winmail_pop_format_string.nasl

Version: $Revision: 1.14 $

Type: remote

Agent: windows

Family: Windows

Published: 2003/06/17

Modified: 2016/10/03

Dependencies: 17975

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2003/05/30

Vulnerability Publication Date: 2003/05/25

Reference Information

CVE: CVE-2003-0391

BID: 7667

OSVDB: 4921