MDaemon IMAP Server FETCH Command Remote Buffer Overflow

High Nessus Plugin ID 31640


The remote mail server is affected by a buffer overflow vulnerability.


According to its banner, the version of MDaemon installed on the remote host contains a stack-based buffer overflow in its IMAP server component that can be triggered via a FETCH command with a long BODY data item. An authenticated, remote attacker may be able to leverage this issue to crash the affected service or execute arbitrary code subject to the privileges under which the service operates.

Note that MDaemon by default runs as a service with SYSTEM privileges under Windows so successful exploitation could result in a complete compromise of the affected system.


Upgrade to MDaemon 9.6.5 or later.

See Also

Plugin Details

Severity: High

ID: 31640

File Name: mdaemon_965.nasl

Version: $Revision: 1.20 $

Type: remote

Agent: windows

Family: Windows

Published: 2008/03/21

Modified: 2017/06/06

Dependencies: 66633

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:alt-n:mdaemon

Required KB Items: mdaemon/installed

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Metasploit (MDaemon 9.6.4 IMAPD FETCH Buffer Overflow)

Reference Information

CVE: CVE-2008-1358

BID: 28245

OSVDB: 43111

EDB-ID: 5248

Secunia: 29382

CWE: 119