Lucene search

K
saintSAINT CorporationSAINT:132528EF0A0ABE0820C9BC93319E35C0
HistoryOct 05, 2007 - 12:00 a.m.

Mercury Mail SMTP AUTH CRAM-MD5 buffer overflow

2007-10-0500:00:00
SAINT Corporation
my.saintcorporation.com
27

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.816

Percentile

98.4%

Added: 10/05/2007
CVE: CVE-2007-4440
BID: 25357
OSVDB: 39669

Background

Mercury Mail Transport System is an e-mail server product for Windows and NetWare.

Problem

A buffer overflow vulnerability in the SMTP service allows remote attackers to execute arbitrary commands by sending a specially crafted argument to the **AUTH CRAM-MD5** command.

Resolution

Upgrade to Mercury Mail Transport System version 4.52 or higher.

References

<http://secunia.com/advisories/26519&gt;
<http://archives.neohapsis.com/archives/fulldisclosure/2007-08/0341.html&gt;

Limitations

Exploit works on Mercury Mail Transport System 4.51.

Platforms

Windows

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.816

Percentile

98.4%