Lucene search

K
nessusThis script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.WORLDMAIL_MAILMA_OVERFLOW.NASL
HistoryMar 05, 2007 - 12:00 a.m.

Eudora WorldMail Mail Management Server (MAILMA.exe) Remote Overflow

2007-03-0500:00:00
This script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
257

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.157 Low

EPSS

Percentile

96.0%

The remote host is running Eudora WorldMail, a commercial mail server for Windows.

According to its banner, the version of Eudora Worldmail installed on the remote host contains a heap-based buffer overflow flaw in its Mail Management Agent. Using a specially crafted request, an unauthenticated, remote attacker may be able to leverage this issue to crash the affected service or execute arbitrary code on the remote host. Since the service runs with LOCAL SYSTEM privileges by default, this could lead to a complete compromise of the affected host.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(24757);
  script_version("1.19");

  script_cve_id("CVE-2006-6336");
  script_bugtraq_id(21897);

  script_name(english:"Eudora WorldMail Mail Management Server (MAILMA.exe) Remote Overflow");
  script_summary(english:"Tries to access WorldMail MAILMA service");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote service is affected by a buffer overflow vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Eudora WorldMail, a commercial mail server
for Windows.

According to its banner, the version of Eudora Worldmail installed on
the remote host contains a heap-based buffer overflow flaw in its Mail
Management Agent.  Using a specially crafted request, an
unauthenticated, remote attacker may be able to leverage this issue to
crash the affected service or execute arbitrary code on the remote
host.  Since the service runs with LOCAL SYSTEM privileges by default,
this could lead to a complete compromise of the affected host." );
 script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-07-001/" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/Jan/137" );
 script_set_attribute(attribute:"solution", value:
"Either block access to the affected port or switch to another product
as the vendor is rumoured to have said it will not release a fix." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2007/03/05");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/01/05");
 script_cvs_date("Date: 2018/11/15 20:50:29");
 script_set_attribute(attribute:"patch_publication_date", value: "2007/01/05");
 script_set_attribute(attribute:"plugin_type", value: "remote");
 script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_dependencies("find_service1.nasl");
  script_require_ports("Services/mailma", 106);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");


port = get_service(svc: "mailma", default: 106, exit_on_fail: 1);

banner = get_service_banner_line(service:"mailma", port:port);
if (
  banner && 
  # nb: don't worry about the banner -- there's no fix.
  egrep(pattern:"^[0-9][0-9][0-9] .*WorldMail Mail Management Server", string:banner)
) security_hole(port);

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.157 Low

EPSS

Percentile

96.0%

Related for WORLDMAIL_MAILMA_OVERFLOW.NASL