Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> Buffer Overrun in ITHouse Mail Server v1.04


Vulnerability Assessment Details

Buffer Overrun in ITHouse Mail Server v1.04

Vulnerability Assessment Summary
Checks if the remote smtp server is ITHouse Mail Server

Detailed Explanation for this Vulnerability Assessment

The remote SMTP server is ITHouse Mail Server.
Versions <= 1.04 of this server are vulnerable to
a buffer overrun which happens during the delivery
routine of the mails if a possible hacker has sent a
message with a too long To: field.

A possible hacker may use this flaw to execute arbitrary
code on this host.

*** Note : we could not check the version number of
*** the server, so this item may be a false positive.

Solution : Contact your vendor for the latest software release.
Network Security Threat Level: High

Networks Security ID: 1285

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison

Cables, Connectors

Vintage Apple Power Macintosh 8100/80 Home Computer for PARTS or REPAIR
$199.95
Vintage Apple Power Macintosh 8100/80 Home Computer for PARTS or REPAIR  pictureTexas Instruments TI-99 4A Vintage PC w/ Adapter Warranty
$69.99
Texas Instruments TI-99 4A Vintage PC w/ Adapter Warranty pictureTexas Instruments TI-99 4A Vintage PC w/ Adapter/Games/Joystick/etc.
$79.99
Texas Instruments TI-99 4A Vintage PC w/ Adapter/Games/Joystick/etc. pictureVintage Compaq Armada 7730MT Laptop Computer Pentium MMX Processor 1997 Powers W
$99.99
Vintage Compaq Armada 7730MT Laptop Computer Pentium MMX Processor 1997 Powers W picture


Discussions

No Discussions have been posted on this vulnerability.