[quote user="hawk"][quote user="HellasGuy"][quote user="hawk"]
This was just posted at http://www.securityfocus.com/bid/25357.
Anything to worry about and is a patch in the works?
[/quote]
I would say: of course there's a lot to worry:
Mercury Mail Transport System is prone to a remote stack-based
buffer-overflow vulnerability because it fails to perform adequate
boundary checks on when handling AUTH CRAM-MD5 requests. Attackers
can exploit this issue to execute arbitrary code with the privileges of
the user running the application. Successful exploits will compromise
the computer. Failed exploit attempts will result in a denial of
service.
[/quote]
Yes, saw that, but in which context is an AUTH CRAM-MD5 request used?
It could be that I'm not even using that module.
[/quote]
Sorry to be quoting myself. A quick google indicates this is used in SMTP-AUTH.
[quote user="hawk"][quote user="HellasGuy"][quote user="hawk"]<p>This was just posted at http://www.securityfocus.com/bid/25357.</p><p><b>Anything to worry about</b> and is a patch in the works?</p><p>[/quote]
</p><p>I would say: of course there's a lot to worry:</p><p>[i]Mercury Mail Transport System is prone to a remote stack-based
buffer-overflow vulnerability because it fails to perform adequate
boundary checks on when handling AUTH CRAM-MD5 requests. Attackers
can exploit this issue to execute arbitrary code with the privileges of
the user running the application. Successful exploits will compromise
the computer. Failed exploit attempts will result in a denial of
service.[/i]</p><p>&nbsp;[/quote]</p><p>Yes, saw that, but in which context is an AUTH CRAM-MD5 request used?</p><p>&nbsp;It could be that I'm not even using that module.&nbsp; </p><p>[/quote]</p><p>Sorry to be quoting myself. A quick google indicates this is used in SMTP-AUTH.
</p>