Mercury IMAP Server LOGIN Command Remote Overflow

high Nessus Plugin ID 24785

Synopsis

The remote IMAP server is affected by a buffer overflow vulnerability.

Description

The remote host is running the Mercury Mail Transport System, a free suite of server products for Windows and NetWare associated with Pegasus Mail.

The remote installation of Mercury Mail includes an IMAP server that is affected by a buffer overflow flaw. Using a specially crafted LOGIN command, an unauthenticated, remote attacker can leverage this issue to crash the remote application and even execute arbitrary code remotely, subject to the privileges under which the application runs.

Solution

Unknown at this time.

Plugin Details

Severity: High

ID: 24785

File Name: mercury_imap_overflow.nasl

Version: 1.15

Type: remote

Published: 3/9/2007

Updated: 7/14/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/14/2006

Exploitable With

Core Impact

Reference Information

CVE: CVE-2006-5961

BID: 21110