Inframail SMTP MAIL FROM Command Remote Overflow DoS

High Nessus Plugin ID 18588


The remote SMTP server is vulnerable to a buffer overflow attack.


The remote host is running the SMTP server component of Inframail, a commercial suite of network servers from Infradig Systems.

According to its banner, the installed version of Inframail suffers from a buffer overflow vulnerability that arises when the SMTP server component processes a MAIL FROM command with an excessively long argument (around 40960 bytes). Successful exploitation will cause the service to crash and may allow arbitrary code execution.


Upgrade to Inframail 7.12 or later.

See Also

Plugin Details

Severity: High

ID: 18588

File Name: inframail_as_smtp_overflow.nasl

Version: $Revision: 1.12 $

Type: remote

Published: 2005/06/29

Modified: 2016/10/27

Dependencies: 10263

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2005/06/27

Reference Information

CVE: CVE-2005-2085

BID: 14077

OSVDB: 17607