Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> IMC SMTP EHLO Buffer Overrun


Vulnerability Assessment Details

IMC SMTP EHLO Buffer Overrun

Vulnerability Assessment Summary
Checks to see if remote IMC SMTP version is vulnerable to buffer overflow

Detailed Explanation for this Vulnerability Assessment
A security vulnerability results
because of an unchecked buffer in the IMC code that
generates the response to the EHLO protocol command.
If the buffer were overrun with data it would result in
either the failure of the IMC or could permit the
attacker to run code in the security context of the IMC,
which runs as Exchange5.5 Service Account.

** Nessus only uses the banner header to acertain
if this vulnerability exists and does not check
for or attempt an actual overflow.

Solution : see
http://www.microsoft.com/technet/security/bulletin/MS02-037.mspx

Network Security Threat Level: Medium

Networks Security ID: 5306

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 SECNAP Network Security, LLC

Cables, Connectors

Lot Of 14 Intel Xeon X7550 SLBRE 8 Core 2.0GHz 18MB CPU Processor
$20.0
Lot Of 14 Intel Xeon X7550 SLBRE 8 Core 2.0GHz 18MB CPU Processor  pictureDell Inspiron 7567 15.6" Full HD Gaming Laptop, Intel i5-7300HQ Processor, 8GB M
$789.99
Dell Inspiron 7567 15.6Intel Xeon E5-4610V3 SR22S 1.70GHz 25MB CACHE 10core CPU LGA 2011-3 Processor
$69.98
Intel Xeon E5-4610V3 SR22S 1.70GHz 25MB CACHE 10core CPU LGA 2011-3 Processor picture


Discussions

No Discussions have been posted on this vulnerability.