ALT-N MDaemon POP Server < 9.06 USER / APOP Command Overflow

Medium Nessus Network Monitor Plugin ID 3734

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

A buffer overflow vulnerability has been reported for MDaemon. The vulnerability is due to inadequate bounds checking one some POP server commands. Namely, 'USER' and 'APOP'. An attacker can exploit this vulnerability by submitting a very large values to these commands on the POP server. This will cause the MDaemon service to crash when attempting to process the command. Successful exploitation would lead to the attacker executing arbitrary code on the remote server.

Solution

Upgrade to version 9.06 or higher.

See Also

http://www.altn.com

Plugin Details

Severity: Medium

ID: 3734

File Name: 3734.prm

Family: POP Server

Published: 2006/08/22

Modified: 2016/02/05

Dependencies: 3035

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND

CVSSv3

Base Score: 5.3

Temporal Score: 4.7

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:P/RL:O/RC:X

Reference Information

CVE: CVE-2006-4364

BID: 19651

OSVDB: 28125