Mercury Mail ph Server Remote Overflow

high Nessus Plugin ID 20812

Synopsis

The remote ph service is affected by a buffer overflow vulnerability.

Description

The remote host is running the Mercury Mail Transport System, a free suite of server products for Windows and Netware associated with Pegasus Mail.

The remote installation of Mercury includes a ph server that is vulnerable to buffer overflow attacks. By leveraging this issue, an unauthenticated, remote attacker is able to crash the remote service and possibly execute arbitrary code remotely.

Solution

Install the Jan 2006 Mercury/32 Security patches for MercuryW and MercuryH.

See Also

http://www.pmail.com/newsflash.htm#whfix

http://www.pmail.com/patches.htm

Plugin Details

Severity: High

ID: 20812

File Name: mercury_ph_overflow.nasl

Version: 1.18

Type: remote

Published: 1/27/2006

Updated: 7/14/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/1/2006

Vulnerability Publication Date: 12/16/2005

Exploitable With

Core Impact

Metasploit (Mercury/32 PH Server Module Buffer Overflow)

Reference Information

CVE: CVE-2005-4411

BID: 16396