BusinessMail Multiple SMTP Command Remote Buffer Overflows

Critical Nessus Plugin ID 19365

Synopsis

The remote SMTP server is susceptible to buffer overflow attacks.

Description

The remote host is running BusinessMail, a commercial mail server for Windows from NetCPlus.

The version of BusinessMail on the remote host fails to sanitize input to the 'HELO' and 'MAIL FROM' SMTP commands, which can be exploited by an unauthenticated, remote attacker to crash the SMTP service and possibly even execute arbitrary code within the context of the server process.

Solution

Upgrade to BusinessMail 4.7 or later.

See Also

http://reedarvin.thearvins.com/20050730-01.html

http://www.nessus.org/u?ac6c13db

http://www.attrition.org/pipermail/vim/2007-June/001640.html

Plugin Details

Severity: Critical

ID: 19365

File Name: businessmail_smtp_overflows.nasl

Version: 1.19

Type: remote

Published: 2005/08/02

Updated: 2018/06/27

Dependencies: 10263

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/08/01

Reference Information

CVE: CVE-2005-2472

BID: 14434