Perdition IMAPD IMAP Tag Remote Format String Arbitrary Code Execution

high Nessus Plugin ID 27598


The remote IMAP server is affected by a format string vulnerability.


The remote IMAP service is actually a Perdition IMAP proxy.

The version of Perdition installed on the remote host appears to be affected by a format string vulnerability in which it copies the IMAP tag into a character buffer without first validating it and then passes it to 'vsnprintf()' as a format string. An unauthenticated remote attacker may be able to leverage this issue to execute arbitrary code on the remote host subject to the permissions under which the proxy runs, by default 'nobody'.

Note that exploiting this to actually execute code may be difficult due to OS and compiler security features.


Upgrade to Perdition version 1.17.1 or later.

See Also

Plugin Details

Severity: High

ID: 27598

File Name: perdition_tag_format_string.nasl

Version: 1.12

Type: remote

Published: 11/1/2007

Updated: 11/15/2018

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-5740

BID: 26270

CWE: 134