Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Alt-N MDaemon Imap Multiple Buffer Overflows


Vulnerability Assessment Details

Alt-N MDaemon Imap Multiple Buffer Overflows

Vulnerability Assessment Summary
Checks the remote version of MDaemon

Detailed Explanation for this Vulnerability Assessment

The remote host is running Alt-N MDaemon, an SMTP/IMAP server for the
Windows operating system family.

It is reported that versions up to and including 8.0.3 are prone to multiple
buffer overflow vulnerabilities.

A possible hacker may cause a denial of service or execute arbitrary code on the
remote server.

The attacker does not need credentials to exploit the flaw in CRAM-MD5/LOGIN
authenticate method.

Solution : Upgrade to MDaemon 8.0.4 or newer.
Network Security Threat Level: High

Networks Security ID: 14315, 14317

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Crucial MX300 2.5" 1TB SATA III 3-D Vertical Internal Solid State Drive (SSD) CT
$48.77
Crucial MX300 2.5Solid State External Hard Drive 500 GB Storage Expansion USB Plug And Play SSD
$240.03
Solid State External Hard Drive 500 GB Storage Expansion USB Plug And Play SSD pictureUSB 2.0 External Enclosure Case Box With Cable For SATA 2.5" SSD Hard Disk Drive
$0.99
USB 2.0 External Enclosure Case Box With Cable For SATA 2.5mSATA SSD To SATA3 2.5" Drive Disk Adapter Card 7mm Thickness Shell Mini Pcie
$3.38
mSATA SSD To SATA3 2.5


Discussions

No Discussions have been posted on this vulnerability.