Lucene search

K
openvasThis script is Copyright (C) 2002 Digital Defense, Inc.OPENVAS:10994
HistoryNov 03, 2005 - 12:00 a.m.

IPSwitch IMail SMTP Buffer Overflow

2005-11-0300:00:00
This script is Copyright (C) 2002 Digital Defense, Inc.
plugins.openvas.org
5

0.008 Low

EPSS

Percentile

80.3%

A vulnerability exists within IMail that
allows remote attackers to gain SYSTEM level
access to servers running IMail’s SMTP
daemon (versions 6.06 and below). The
vulnerability stems from the IMail SMTP daemon
not doing proper bounds checking on various input
data that gets passed to the IMail Mailing List
handler code. If an attacker crafts a special
buffer and sends it to a remote IMail SMTP server
it is possible that an attacker can remotely execute
code (commands) on the IMail system.

# OpenVAS Vulnerability Test
# $Id: DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl 6053 2017-05-01 09:02:51Z teissa $
# Description: IPSwitch IMail SMTP Buffer Overflow
#
# Authors:
# Forrest Rae <[email protected]>
# Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>
# Erik Anderson <[email protected]>
# Added BugtraqID
#
# Copyright:
# Copyright (C) 2002 Digital Defense, Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "A vulnerability exists within IMail that
allows remote attackers to gain SYSTEM level
access to servers running IMail's SMTP
daemon (versions 6.06 and below). The
vulnerability stems from the IMail SMTP daemon 
not doing proper bounds checking on various input 
data that gets passed to the IMail Mailing List 
handler code. If an attacker crafts a special 
buffer and sends it to a remote IMail SMTP server 
it is possible that an attacker can remotely execute 
code (commands) on the IMail system.";

tag_solution = "Download the latest patch from
http://ipswitch.com/support/IMail/patch-upgrades.html";

if(description)
{
	script_id(10994);
	script_version("$Revision: 6053 $");
	script_tag(name:"last_modification", value:"$Date: 2017-05-01 11:02:51 +0200 (Mon, 01 May 2017) $");
	script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
	script_bugtraq_id(2083, 2651);
    script_tag(name:"cvss_base", value:"7.5");
    script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
	script_cve_id("CVE-2001-0039","CVE-2001-0494");

 
 	name = "IPSwitch IMail SMTP Buffer Overflow";
 	script_name(name);
 
 	summary = "IPSwitch IMail SMTP Buffer Overflow";
	script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_vul");
	script_copyright("This script is Copyright (C) 2002 Digital Defense, Inc.");
	family = "SMTP problems";
	script_family(family);
	script_dependencies("find_service.nasl");
	script_require_ports(25);
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
	exit(0);
}

debug = 0;
ddidata = string("Not Applicable");
port = 25;

if(get_port_state(port))
{
	if(debug == 1) { display("Port ", port, " is open.\n"); }
		

	soc = open_sock_tcp(port);
	if(soc)
	{
		if(debug == 1)
		{
			display("Socket is open.\n");
		}
		
		banner = recv_line(socket:soc, length:4096);
		
		if(debug == 1)
		{
			display("\n---------Results from request ---------\n");
			display(banner);
			display("\n---------End of Results from request ---------\n\n");
		}
		     
		if(
		   egrep(pattern:"IMail 6\.0[1-6] ", string:banner) 	|| 
		   egrep(pattern:"IMail 6\.0 ", string:banner) 		||
		   egrep(pattern:"IMail [1-5]\.", string:banner)
		  )
		{
			if(debug == 1)
			{
				display("SMTP Server is Imail\n");
			}
		
			security_message(port); 
			exit(0);
		}

		close(soc);
	}
	else
	{
		if(debug == 1) { display("Error: Socket didn't open.\n"); }
	}
}



0.008 Low

EPSS

Percentile

80.3%

Related for OPENVAS:10994