Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Alt-N MDaemon Imap Multiple Buffer Overflows


Vulnerability Assessment Details

Alt-N MDaemon Imap Multiple Buffer Overflows

Vulnerability Assessment Summary
Checks the remote version of MDaemon

Detailed Explanation for this Vulnerability Assessment

The remote host is running Alt-N MDaemon, an SMTP/IMAP server for the
Windows operating system family.

It is reported that versions up to and including 8.0.3 are prone to multiple
buffer overflow vulnerabilities.

A possible hacker may cause a denial of service or execute arbitrary code on the
remote server.

The attacker does not need credentials to exploit the flaw in CRAM-MD5/LOGIN
authenticate method.

Solution : Upgrade to MDaemon 8.0.4 or newer.
Network Security Threat Level: High

Networks Security ID: 14315, 14317

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Apple MacBook Air Core i5 1.6GHz 4GB RAM 128GB SSD 11" A1465 - MJVM2LL/A
$300.0
Apple MacBook Air Core i5 1.6GHz 4GB RAM 128GB SSD 11New Kingston Memory HX426C15FBK2/8 8GB DDR4 2666 Unbuffered HyperX 2x4GB Fury Bl
$95.51
New Kingston Memory HX426C15FBK2/8 8GB DDR4 2666 Unbuffered HyperX 2x4GB Fury Bl pictureXiede Desktop Computer Memory Ram Module Ddr3 1333 4Gb Pc3-10600 240Pin Dim R3M7
$21.8
Xiede Desktop Computer Memory Ram Module Ddr3 1333 4Gb Pc3-10600 240Pin Dim R3M7 pictureJuhor Ddr3 1600Mhz 1.35V Low Voltage 204 Pin Ram Memory For Laptop D7M9
$13.12
Juhor Ddr3 1600Mhz 1.35V Low Voltage 204 Pin Ram Memory For Laptop D7M9 picture


Discussions

No Discussions have been posted on this vulnerability.