| VID |
12030 |
| Severity |
40 |
| Port |
110 |
| Protocol |
TCP |
| Class |
POP3 |
| Detailed Description |
The XtraMail POP3 server is vulnerable to a denial of service attack. There are several unchecked buffers in XtraMail 1.11, which allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary commands.
1. POP3 server PASS argument Will be overflowed with a password of over 1500 characters.
2. SMTP server HELO argument Will be overflowed with a 10,000 character argument to the HELO command.
3. Control service Username XtraMail includes a remote administration utility which listens on port 32000 for logins. The username buffer will be overflowed with a string of 10,000 characters or more.
* Note: The service must be restarted to regain normal functionality.
* References: http://marc.theaimsgroup.com/?l=bugtraq&m=94226003804744&w=2 http://www.ussrback.com/labs11.html
* Platforms Affected: Microsoft Windows Any version XtraMail 1.11 |
| Recommendation |
No remedy available as of June 2014. Replace with an alternative POP3 server. |
| Related URL |
CVE-1999-1511 (CVE) |
| Related URL |
791 (SecurityFocus) |
| Related URL |
3488 (ISS) |
|