Lucene search

K
saintSAINT CorporationSAINT:4DE1AB6F5F9AA27FADB8EB2DA87D3E08
HistorySep 29, 2006 - 12:00 a.m.

IMail SMTP RCPT TO buffer overflow

2006-09-2900:00:00
SAINT Corporation
download.saintcorporation.com
26

EPSS

0.961

Percentile

99.5%

Added: 09/29/2006
CVE: CVE-2006-4379
BID: 19885
OSVDB: 28576

Background

IMail is an e-mail server for Windows platforms.

Problem

A buffer overflow vulnerability in the SMTP daemon allows remote command execution by sending a **RCPT TO** argument containing a long string between **@** and **:** characters.

Resolution

Upgrade to IMail 2006.1 or higher.

References

<http://www.securityfocus.com/archive/1/445521&gt;

Limitations

Exploit works with IMail Server 8.10. Exploitation requires that the server have a fixed IP address. Due to the nature of the vulnerability, the success of the exploit may depend on the state of the target system.

Platforms

Windows 2000
Windows Server 2003

EPSS

0.961

Percentile

99.5%