Xtramail < 1.12 Control Server Overflow Denial of Service

high Nessus Network Monitor Plugin ID 1799
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote Xtramail Control Server is vulnerable to a buffer overflow when a user supplies a too long argument to as its username. An attacker may use this flaw to disable this service remotely or to execute arbitrary code on this host, with the privileges of the Xtramail server (typically, SYSTEM).

Solution

Upgrade to Xtramail version 1.12 or higher.

See Also

http://archives.neohapsis.com/archives/ntbugtraq/1999-q3/0362.html

Plugin Details

Severity: High

ID: 1799

Family: POP Server

Published: 8/20/2004

Updated: 3/6/2019

Dependencies: 3035

Nessus ID: 10323

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Vulnerability Information

CPE: cpe:2.3:a:artisoft:xtramail:*:*:*:*:*:*:*:*

Reference Information

CVE: CVE-1999-1511

BID: 791