CMail MAIL FROM Command Remote Overflow

critical Nessus Plugin ID 10047

Synopsis

The remote mail server has a buffer overflow vulnerability.

Description

The remote host appears to be running a vulnerable version of CMail.
Issuing a long argument to the 'MAIL FROM' command can result in a buffer overflow. An attack would look something similar to :

MAIL FROM: AAA[...][email protected]

Where AAA[...]AAA contains more than 8000 'A's.

A remote attacker could exploit this issue to crash the mail server, or possibly to execute arbitrary code.

Solution

Contact the vendor for a fix.

See Also

https://seclists.org/bugtraq/1999/Oct/297

https://marc.info/?l=bugtraq&m=93720402717560&w=2

Plugin Details

Severity: Critical

ID: 10047

File Name: cmail_overflow.nasl

Version: 1.46

Type: remote

Published: 10/29/1999

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/26/1999

Reference Information

CVE: CVE-1999-1521

BID: 633