Korean
<< Back
VID 18072
Severity 40
Port 143
Protocol TCP
Class IMAP
Detailed Description The Mercury IMAP server, according to its banner, has multiple buffer overflow vulnerabilities.
Mercury Mail is a freely available Mail Transfer Agent (MTA) server for Microsoft Windows operating systems, and acts as an SMTP, IMAP, and POP server. Mercury Mail 4.01a and possibly earlier versions are vulnerable to multiple buffer overflow vulnerabilities, caused by improper bounds checking in its IMAP server implementation. By sending malicious data as an argument to one of the affected IMAP commands, such as EXAMINE, SUBSCRIBE, STATUS, APPEND and etc, an authenticated, remote attacker could overflow a buffer and execute arbitrary machine code in the context of the affected server process.

* Note: This check solely relied on the banner of the remote IMAP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.k-otik.com/exploits/20041129.mercury.php
http://www.securityfocus.com/archive/1/382929
http://www.securityfocus.com/archive/1/383136

* Platforms Affected:
David Harris, Pegasus Mercury Mail 4.01a and possibly earlier versions
Microsoft Windows Any version
Recommendation No upgrade or patch available as of December 2004.

Upgrade to the new version of Mercury Mail server, when new version fixed this problem becomes available from the official Pegasus Mail distribution site at http://www.pmail.com/downloads_maine_t.htm
Related URL CVE-2004-1211 (CVE)
Related URL 11775 (SecurityFocus)
Related URL 18318 (ISS)