Lucene search

K
saintSAINT CorporationSAINT:29EE8D12D78BE4CDB7E0B58E1DBD81EC
HistoryOct 05, 2007 - 12:00 a.m.

Mercury Mail SMTP AUTH CRAM-MD5 buffer overflow

2007-10-0500:00:00
SAINT Corporation
download.saintcorporation.com
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.816 High

EPSS

Percentile

98.4%

Added: 10/05/2007
CVE: CVE-2007-4440
BID: 25357
OSVDB: 39669

Background

Mercury Mail Transport System is an e-mail server product for Windows and NetWare.

Problem

A buffer overflow vulnerability in the SMTP service allows remote attackers to execute arbitrary commands by sending a specially crafted argument to the **AUTH CRAM-MD5** command.

Resolution

Upgrade to Mercury Mail Transport System version 4.52 or higher.

References

<http://secunia.com/advisories/26519&gt;
<http://archives.neohapsis.com/archives/fulldisclosure/2007-08/0341.html&gt;

Limitations

Exploit works on Mercury Mail Transport System 4.51.

Platforms

Windows

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.816 High

EPSS

Percentile

98.4%

Related for SAINT:29EE8D12D78BE4CDB7E0B58E1DBD81EC