Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Alt-N MDaemon Imap Multiple Buffer Overflows


Vulnerability Assessment Details

Alt-N MDaemon Imap Multiple Buffer Overflows

Vulnerability Assessment Summary
Checks the remote version of MDaemon

Detailed Explanation for this Vulnerability Assessment

The remote host is running Alt-N MDaemon, an SMTP/IMAP server for the
Windows operating system family.

It is reported that versions up to and including 8.0.3 are prone to multiple
buffer overflow vulnerabilities.

A possible hacker may cause a denial of service or execute arbitrary code on the
remote server.

The attacker does not need credentials to exploit the flaw in CRAM-MD5/LOGIN
authenticate method.

Solution : Upgrade to MDaemon 8.0.4 or newer.
Network Security Threat Level: High

Networks Security ID: 14315, 14317

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Vintage Apple Power Macintosh 8100/80 Home Computer for PARTS or REPAIR
$199.95
Vintage Apple Power Macintosh 8100/80 Home Computer for PARTS or REPAIR  pictureTexas Instruments TI-99 4A Vintage PC w/ Adapter Warranty
$69.99
Texas Instruments TI-99 4A Vintage PC w/ Adapter Warranty pictureTexas Instruments TI-99 4A Vintage PC w/ Adapter/Games/Joystick/etc.
$79.99
Texas Instruments TI-99 4A Vintage PC w/ Adapter/Games/Joystick/etc. pictureVintage Compaq Armada 7730MT Laptop Computer Pentium MMX Processor 1997 Powers W
$99.99
Vintage Compaq Armada 7730MT Laptop Computer Pentium MMX Processor 1997 Powers W picture


Discussions

No Discussions have been posted on this vulnerability.