SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   IA eMailServer Vendors:   True North Software
IA eMailServer Buffer Overflow in MAP SEARCH Command Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1015664
SecurityTracker URL:  http://securitytracker.com/id/1015664
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 22 2006
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 5.3.4; possibly older versions
Description:   A vulnerability was reported in IA eMailServer. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can send a specially crafted SEARCH command to cause the target service to crash. It may also be possible to execute arbitrary code on the target system.

A demonstration exploit transcript is provided:

A001 LOGIN username password // enter in AUTHENTICATED state
A002 SELECT inbox // enter in SELECTED state
A003 SEARCH <A x 560> // overflow search argument

Joao Antunes reported this vulnerability.

Impact:   A remote authenticated user can execute arbitrary code on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.tnsoft.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [AJECT] TrueNorth IA eMailserver 5.3.4 buffer overflow vulnerability

----------------------------------------
Synopsis
----------------------------------------
TrueNorth IA eMailserver 5.3.4 is prone to a remote buffer overflow
vulnerability in the IMAP server.
Product: Internet Anywhere eMailserver Corporate Edition
Version: 5.3.4 and probably the older versions
Vendor: TrueNorth/NoticeWare (http://www.tnsoft.com/)
Type: Buffer overflow / Boundary condition error
Risk: Execution of arbitrary code, denial of service
Remote: Yes
Exploit: Not Available
Solution: Not Available
Status: Unpatched. No reply from developer(s).


----------------------------------------
Vulnerability Description
----------------------------------------
The vulnerability can be triggered by sending the following messages to
the imap server:
A001 LOGIN username password	// enter in AUTHENTICATED state
A002 SELECT inbox		// enter in SELECTED state
A003 SEARCH <A x 560>		// overflow search argument

This will crash the server. Successful exploitation could result in a
denial of service or execution of arbitrary code.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC