|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SMTP problems >> Smail-3 Multiple Vulnerabilities Vulnerability Assessment Details
|
Smail-3 Multiple Vulnerabilities |
||
Checks the version of the remote Smail daemon Detailed Explanation for this Vulnerability Assessment Summary : The remote mail server is affected by multiple vulnerabilities. Description : According to its banner, the remote host is running as its mail server S-mail version 3.2.0.120 or older. Such versions contain various vulnerabilities that may permit an unauthenticated attacker to execute arbitrary code on the remote host by exploiting a heap overflow by sending a malformed argument to the 'MAIL FROM' command. See also : http://archives.neohapsis.com/archives/bugtraq/2005-03/0435.html http://archives.neohapsis.com/archives/bugtraq/2005-03/0459.html http://archives.neohapsis.com/archives/bugtraq/2005-03/0462.html http://archives.neohapsis.com/archives/bugtraq/2005-03/0474.html ftp://ftp.weird.com/pub/local/smail-3.2.0.121.ChangeLog Solution : Upgrade to Smail 3.2.0.121 or later. Network Security Threat Level: High / CVSS Base Score : 7 (AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N) Networks Security ID: 12899, 12922 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |