Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Alt-N MDaemon Imap Multiple Buffer Overflows


Vulnerability Assessment Details

Alt-N MDaemon Imap Multiple Buffer Overflows

Vulnerability Assessment Summary
Checks the remote version of MDaemon

Detailed Explanation for this Vulnerability Assessment

The remote host is running Alt-N MDaemon, an SMTP/IMAP server for the
Windows operating system family.

It is reported that versions up to and including 8.0.3 are prone to multiple
buffer overflow vulnerabilities.

A possible hacker may cause a denial of service or execute arbitrary code on the
remote server.

The attacker does not need credentials to exploit the flaw in CRAM-MD5/LOGIN
authenticate method.

Solution : Upgrade to MDaemon 8.0.4 or newer.
Network Security Threat Level: High

Networks Security ID: 14315, 14317

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Intel Core 2 Duo T7700 2.4 GHz 4M 800 SLAF7 Processor CPU
$1.99
Intel Core 2 Duo T7700 2.4 GHz 4M 800 SLAF7 Processor CPU  picture2X(2pcs CPU Heatsink Bracket Backplate for AMD LGA 1155 1150 Motherboard F4I7)
$3.77
2X(2pcs CPU Heatsink Bracket Backplate for AMD LGA 1155 1150 Motherboard F4I7) pictureIntel Core 2 Duo T7500 CPU SLA44 SLAF8 2.2 GHZ 4MB 800MHZ Socket Processor
$0.99
Intel Core 2 Duo T7500 CPU SLA44 SLAF8 2.2 GHZ 4MB 800MHZ Socket Processor pictureIntel Xeon E3-1220 SR00F 3.1GHZ 8MB Quad-Core CPU Socket LGA1155
$22.99
Intel Xeon E3-1220 SR00F 3.1GHZ 8MB Quad-Core CPU Socket LGA1155 picture


Discussions

No Discussions have been posted on this vulnerability.