VID |
23156 |
Severity |
40 |
Port |
105 |
Protocol |
TCP |
Class |
Daemon |
Detailed Description |
The Mercury ph service, according to its version number, has a buffer overflow vulnerability. Mercury Mail Transport System is a freely available mail server associated with Pegasus Mail for Microsoft Windows and Novell NetWare platforms. Mercury Mail Transport System version 4.01b and earlier versions are vulnerable to a remote buffer overflow vulnerability, caused by improper bounds checking of the mailbox name service in the "MercuryH PH Directory Server" protocol module. By sending specially-crafted data to the mailbox name service on TCP port 105, a remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.
* Note: This check solely relied on the version number of the remote Mercury ph service to assess this vulnerability, so this might be a false positive.
* References: http://www.milw0rm.com/id.php?id=1375 http://www.pmail.com/newsflash.htm#whfix http://secunia.com/advisories/18611/ http://www.securitytracker.com/alerts/2005/Dec/1015374.html
* Platforms Affected: David Harris, Mercury Mail Transport System version 4.01b and earlier versions Microsoft Windows Any version |
Recommendation |
Download and install the Jan 2006 Mercury/32 Security patches for MercuryW and MercuryH, available from Pegasus Mail Web site at http://www.pmail.com/patches.htm |
Related URL |
CVE-2005-4411 (CVE) |
Related URL |
16396 (SecurityFocus) |
Related URL |
23669 (ISS) |
|