Korean
<< Back
VID 18075
Severity 40
Port 110
Protocol TCP
Class POP3
Detailed Description The Digital Mappings Systems POP3 server, according to its banner, has a buffer overflow vulnerability. Digital Mapping Systems (DMS) POP3 Server is an email server with a POP3 component for Microsoft Windows platforms. DMS POP3 Server version 1.5.3 build 37 and earlier versions are vulnerable to a buffer overflow vulnerability, caused by a boundary error during the authentication process. By sending a username or password of excessive length during the authentication process to the POP3 server, a remote attacker could overflow a buffer and cause a denial of service, or possibly execute arbitrary code with the privileges of the user that activated the vulnerable application.

* Note: This check solely relied on the banner of the remote POP3 server to assess this vulnerability, so this might be a False Positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2004-11/0236.html
http://packetstormsecurity.nl/0411-exploits/dmsPOP3.txt
http://secunia.com/advisories/13248/
http://www.securiteam.com/windowsntfocus/6H00R0KBPO.html

* Platforms Affected:
Digital Mapping Systems, DMS POP3 Server 1.5.3 b37 and earlier
Microsoft Windows Any version
Recommendation Apply the appropriate patch for this vulnerability, available from the DMS POP3 Server Update Web page at http://www.digitalmapping.sk.ca/pop3srv/Update.asp
Related URL CVE-2004-1533 (CVE)
Related URL 11705 (SecurityFocus)
Related URL 18161 (ISS)