Lucene search

K
nessusThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.DMS_POP3_OVERFLOW.NASL
HistoryNov 22, 2004 - 12:00 a.m.

Digital Mappings Systems POP3 Server (pop3svr.exe) Multiple Field Remote Overflow

2004-11-2200:00:00
This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
www.tenable.com
14

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.025 Low

EPSS

Percentile

90.2%

The remote host is running Digital Mappings Systems POP3 server that has a remote buffer overrun vulnerability. An attacker, exploiting this flaw, may be crash the service.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(15783);
 script_version ("1.12");
 script_cve_id("CVE-2004-1533");
 script_bugtraq_id( 11705 );

 script_name(english:"Digital Mappings Systems POP3 Server (pop3svr.exe) Multiple Field Remote Overflow");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote server is vulnerable to a denial of service attack." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Digital Mappings Systems POP3 server that
has a remote buffer overrun vulnerability.  An attacker, exploiting
this flaw, may be crash the service." );
 script_set_attribute(attribute:"solution", value:
"Ensure that you are running a recent and protected POP3 Server." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/18");
 script_cvs_date("Date: 2018/07/10 14:27:33");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_summary(english:"checks the banner of the remote POP3 server");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");
 script_dependencie("find_service2.nasl");
 script_require_ports("Services/pop3", 110);
 exit(0);
}

#
# The script code starts here
#
include("pop3_func.inc");

port = get_kb_item("Services/pop3");
if ( ! port ) port = 110;
if ( ! get_port_state(port) ) exit(0);

banner = get_pop3_banner(port:port);
if ( ! banner ) exit(0);
if ( egrep(pattern:"^\+OK.*DMS POP3 Server 1\.([0.4]\.|5\.([0.2]\.|3\.([0-9][^0-9]|[0-1][0-9][^0-9]|2[0-7])))", string:port) )
	security_warning(port);

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.025 Low

EPSS

Percentile

90.2%

Related for DMS_POP3_OVERFLOW.NASL