Lucene search

K
saintSAINT CorporationSAINT:489799B84B25E6D81BA76814A5E1420D
HistoryMar 27, 2007 - 12:00 a.m.

MERCUR imapd SUBSCRIBE command buffer overflow

2007-03-2700:00:00
SAINT Corporation
www.saintcorporation.com
7

0.651 Medium

EPSS

Percentile

97.6%

Added: 03/27/2007
CVE: CVE-2007-1579
BID: 23050
OSVDB: 33546

Background

[MERCUR Messaging Server](<http://www.atrium-software.com/index.php?conte
nt=mercur>) is an e-mail server supporting the SMTP, POP3, and IMAP protocols for Windows platforms.

Problem

A buffer overflow vulnerability allows remote, authenticated attackers to execute arbitrary commands by sending a long, specially crafted SUBSCRIBE command to the IMAP service.

Resolution

Upgrade to MERCUR Messaging Server 5.0 SP5 or higher when available.

References

<http://secunia.com/advisories/24619/&gt;

Limitations

Exploit works on MERCUR Messaging Server 5.0 SP3 and SP4 and requires a valid user name and password.

The number of characters in the mail domain should be correct in order for the exploit to succeed.

Platforms

Windows 2000
Windows Server 2003 SP0
Windows Server 2003 SP1 / Windows Server 2003

0.651 Medium

EPSS

Percentile

97.6%

Related for SAINT:489799B84B25E6D81BA76814A5E1420D