Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> MDaemon IMAP CREATE overflow


Vulnerability Assessment Details

MDaemon IMAP CREATE overflow

Vulnerability Assessment Summary
Acertains the version number of the remote IMAP server

Detailed Explanation for this Vulnerability Assessment

It is possible to crash the remote MDaemon server by suppling
an oversized argument to the CREATE imap command.

A possible hacker may use this flaw to prevent other users from
fetching their e-mail. It will also crash other MDaemon services
(SMTP, POP), thus preventing this server from receiving any email
as well, or even to execute arbitrary code on this host with the
rights of the mdaemon IMAP daemon.

To exploit this flaw, a valid IMAP account is needed.

*** Nessus solely relied on the version number of the remote server
*** to issue this warning.

Solution : upgrade to MDaemon 6.7.10 or newer
Network Security Threat Level: High

Networks Security ID: 7446

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

Dell Latitude 7480 Motherboard LA-E132P PFNHF Core i5-4310U 2.00GHz Processor
$254.99
Dell Latitude 7480 Motherboard LA-E132P PFNHF Core i5-4310U 2.00GHz Processor pictureSONY P4S533-VL INTEL 478 SiS651 DESKTOP MOTHERBORD
$12.0
SONY P4S533-VL INTEL 478 SiS651 DESKTOP MOTHERBORD picture12 Core Opteron Server MotherBoard w/28 GB ECC Registered RAM
$75.0
12 Core Opteron Server MotherBoard w/28 GB ECC Registered RAM pictureASRock X99 WS, Socket LGA 2011-v3, USB 3.0 Extended ATX Intel Motherboard Server
$149.0
ASRock X99 WS, Socket LGA 2011-v3, USB 3.0 Extended ATX Intel Motherboard Server picture


Discussions

No Discussions have been posted on this vulnerability.