Perdition IMAPD IMAP Tag Remote Format String Arbitrary Code Execution

high Nessus Plugin ID 27598

Synopsis

The remote IMAP server is affected by a format string vulnerability.

Description

The remote IMAP service is actually a Perdition IMAP proxy.

The version of Perdition installed on the remote host appears to be affected by a format string vulnerability in which it copies the IMAP tag into a character buffer without first validating it and then passes it to 'vsnprintf()' as a format string. An unauthenticated remote attacker may be able to leverage this issue to execute arbitrary code on the remote host subject to the permissions under which the proxy runs, by default 'nobody'.

Note that exploiting this to actually execute code may be difficult due to OS and compiler security features.

Solution

Upgrade to Perdition version 1.17.1 or later.

See Also

https://www.securityfocus.com/archive/1/483034

Plugin Details

Severity: High

ID: 27598

File Name: perdition_tag_format_string.nasl

Version: 1.12

Type: remote

Published: 11/1/2007

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Reference Information

CVE: CVE-2007-5740

BID: 26270

CWE: 134