Hello all
This was also reported tonight on SANS's weekly Consensus Security Vulnerability Alert (Vol. 6 No. 39) and rated Moderate:
(7) MODERATE: Pegasus Mercury/32 IMAP Server SEARCH Command BufferNote that it is listed upfront in the newsletter as MErcury is considered a widely deployed software (a bit of vanity doesn't hurt [;)] ) As you can see, there seem to be a proff of concept out there. I cannot verify myself as I currently have no working installation of Mercury.
Overflow
Affected;
Pegasus Mercury/32 version 4.52 and prior
Description: Pegasus Mercury/32 IMAP is a popular IMAP server for
Microsoft Windows. The server fails to properly handle overlong IMAP
SEARCH commands. A specially crafted IMAP SEARCH command could trigger
a buffer overflow and allow an authenticated user to execute arbitrary
code with the privileges of the vulnerable process (often SYSTEM). A
proof-of-concept for this vulnerability is publicly available. Note that
an attacker would need valid login credentials to exploit this
vulnerability.
Status: Vendor has not confirmed, no updates available.
References:
Proof-of-Concept
http://downloads.securityfocus.com/vulnerabilities/exploits/25733.pl
Wikipedia Article on IMAP
http://en.wikipedia.org/wiki/IMAP
Vendor Home Page
http://www.pmail.com/
SecurityFocus BID
http://www.securityfocus.com/bid/25733
The SANS institue can be contacted from their website at www.sans.org.
Cheers!
Hello all
This was also reported tonight on SANS's weekly Consensus Security Vulnerability Alert (Vol. 6 No. 39) and rated Moderate:
<BLOCKQUOTE>(7) MODERATE: Pegasus Mercury/32 IMAP Server SEARCH Command Buffer
Overflow
Affected;
Pegasus Mercury/32 version 4.52 and prior
Description: Pegasus Mercury/32 IMAP is a popular IMAP server for
Microsoft Windows. The server fails to properly handle overlong IMAP
SEARCH commands. A specially crafted IMAP SEARCH command could trigger
a buffer overflow and allow an authenticated user to execute arbitrary
code with the privileges of the vulnerable process (often SYSTEM). A
proof-of-concept for this vulnerability is publicly available. Note that
an attacker would need valid login credentials to exploit this
vulnerability.
Status: Vendor has not confirmed, no updates available.
References:
Proof-of-Concept
http://downloads.securityfocus.com/vulnerabilities/exploits/25733.pl
Wikipedia Article on IMAP
http://en.wikipedia.org/wiki/IMAP
Vendor Home Page
http://www.pmail.com/
SecurityFocus BID
http://www.securityfocus.com/bid/25733
</BLOCKQUOTE>Note that it is listed upfront in the newsletter as MErcury is considered a widely deployed software (a bit of vanity doesn't hurt [;)] ) As you can see, there seem to be a proff of concept out there. I cannot verify myself as I currently have no working installation of Mercury.
The SANS institue can be contacted from their website at www.sans.org.
Cheers!