| VID |
18072 |
| Severity |
40 |
| Port |
143 |
| Protocol |
TCP |
| Class |
IMAP |
| Detailed Description |
The Mercury IMAP server, according to its banner, has multiple buffer overflow vulnerabilities. Mercury Mail is a freely available Mail Transfer Agent (MTA) server for Microsoft Windows operating systems, and acts as an SMTP, IMAP, and POP server. Mercury Mail 4.01a and possibly earlier versions are vulnerable to multiple buffer overflow vulnerabilities, caused by improper bounds checking in its IMAP server implementation. By sending malicious data as an argument to one of the affected IMAP commands, such as EXAMINE, SUBSCRIBE, STATUS, APPEND and etc, an authenticated, remote attacker could overflow a buffer and execute arbitrary machine code in the context of the affected server process.
* Note: This check solely relied on the banner of the remote IMAP server to assess this vulnerability, so this might be a false positive.
* References: http://www.k-otik.com/exploits/20041129.mercury.php http://www.securityfocus.com/archive/1/382929 http://www.securityfocus.com/archive/1/383136
* Platforms Affected: David Harris, Pegasus Mercury Mail 4.01a and possibly earlier versions Microsoft Windows Any version |
| Recommendation |
No upgrade or patch available as of December 2004.
Upgrade to the new version of Mercury Mail server, when new version fixed this problem becomes available from the official Pegasus Mail distribution site at http://www.pmail.com/downloads_maine_t.htm |
| Related URL |
CVE-2004-1211 (CVE) |
| Related URL |
11775 (SecurityFocus) |
| Related URL |
18318 (ISS) |
|