Korean
<< Back
VID 23156
Severity 40
Port 105
Protocol TCP
Class Daemon
Detailed Description The Mercury ph service, according to its version number, has a buffer overflow vulnerability. Mercury Mail Transport System is a freely available mail server associated with Pegasus Mail for Microsoft Windows and Novell NetWare platforms. Mercury Mail Transport System version 4.01b and earlier versions are vulnerable to a remote buffer overflow vulnerability, caused by improper bounds checking of the mailbox name service in the "MercuryH PH Directory Server" protocol module. By sending specially-crafted data to the mailbox name service on TCP port 105, a remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.

* Note: This check solely relied on the version number of the remote Mercury ph service to assess this vulnerability, so this might be a false positive.

* References:
http://www.milw0rm.com/id.php?id=1375
http://www.pmail.com/newsflash.htm#whfix
http://secunia.com/advisories/18611/
http://www.securitytracker.com/alerts/2005/Dec/1015374.html

* Platforms Affected:
David Harris, Mercury Mail Transport System version 4.01b and earlier versions
Microsoft Windows Any version
Recommendation Download and install the Jan 2006 Mercury/32 Security patches for MercuryW and MercuryH, available from Pegasus Mail Web site at http://www.pmail.com/patches.htm
Related URL CVE-2005-4411 (CVE)
Related URL 16396 (SecurityFocus)
Related URL 23669 (ISS)