Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:4740
HistoryJun 24, 2003 - 12:00 a.m.

[NT] Multiple Buffer Overflow Vulnerabilities Found in MERCUR Mail Server

2003-06-2400:00:00
vulners.com
23

The following security advisory is sent to the securiteam mailing list, and can be found at the
SecuriTeam web site: http://www.securiteam.com

    • promotion

Beyond Security in Canada

Toronto-based Sunrays Technologies is now Beyond Security's representative in Canada.
We welcome ISPs, system integrators and IT systems resellers
to promote the most advanced vulnerability assessment solutions today.

Contact us at 416-482-0038 or at [email protected]


Multiple Buffer Overflow Vulnerabilities Found in MERCUR Mail Server

SUMMARY

<http://atrium-softwareusa.com/EN/mercur_products.html&gt; Mercur Mail
Server is a fully compliant POP3, SMTP, IMAP4 mail server that offers
business and individual users a level stability, security, and scalability
not matched by other mail server products. It supports unlimited domains
and user accounts. Multiple buffer overflow vulnerabiltiies have been
found in the product, allowing attackers to cause the server to crash.

DETAILS

Vulnerable systems:

  • MERCUR IMAP4-Server version 4.02.09

Immune systems:

  • MERCUR IMAP4-Server version 4.2.15.0

Whenever a malicious attacker sends a large of data with any of these
commands: EXAMINE, DELETE, SUBSCRIBE, RENAME, UNSUBSCRIBE, LIST, LSUB,
STATUS, LOGIN, CREATE, SELECT, a buffer will overflow, causing the server
to crash (Sending more than 8000 characters will not cause any effect as
the service will stop the request from overflow the buffer).

Vendor response:
Dear Dennis,
Our programmers informed us that they have fixed the problem and now they
are testing it. I will inform you when a fix is available, it should be
soon. Thank you for pointing out this problem to us.
Sincerely,
Alex Ribeiro

Disclosure timeline:
10/05/2003 Found the Vulnerability, and made an analysis.
13/05/2003 Reported to Vendor.
14/05/2003 Recived information from Vendor
06/06/2003 Public Disclosure

ADDITIONAL INFORMATION

The information has been provided by
<mailto:[email protected]> NC Agent.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to:
[email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]

====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages.