Check Point Advisories

Preemptive Protection against Mercury Mail IMAP Buffer Overflow Vulnerability

Check Point Reference: CPAI-2007-042
Date Published: 11 Apr 2007
Severity: High
Last Updated: Wednesday 25 April, 2007
Source: Secunia Advisory: SA13348
Industry Reference:

CVE-2004-1211

Protection Provided by:
Who is Vulnerable? Mercury Mail version 4.01 and Prior 
Vulnerability Description Multiple buffer overflow vulnerabilities exist in Mercury Mail Transport System. Mercury Mail Transport System is a free mail server program that supports various email access and exchange protocols, including the Internet Message Access Protocol (IMAP). IMAP is a standard protocol for accessing e-mail from a local server that provides management of received messages on a remote server. Several mail servers contain buffer overflow errors in the way they handle commands. A remote attacker can exploit this issue to trigger a buffer overflow which may lead to an application crash and to arbitrary code execution.
Update/Patch AvaliableApply patch:
ftp://ftp.usm.maine.edu/pegasus/mercury32/m32-401b.zip
Vulnerability DetailsThe vulnerability is due to a buffer overflow error when processing malformed IMAP commands. A remote attacker can exploit this flaw via a specially crafted IMAP command with an overly long string in its parameter. Successful exploitation may allow an attacker to create a denial of service condition or execute arbitrary code on an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK