Plugin ID | 335 |
Plugin name | Alt-N MDaemon prior 7.2.1 local privilege escalation vulnerability |
Plugin filename | Alt-N MDaemon prior 7.2.1 local privilege escalation vulnerability.plugin |
Plugin filesize | 2521 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/09 |
Plugin version | 1.1 |
Plugin protocol | tcp |
Plugin port | 25 |
Plugin procedure detection | open|sleep|close|pattern_exists 220*ESMTP MDaemon [0-6].* OR 220*ESMTP MDaemon 7.[0-1].* OR 220*ESMTP MDaemon 7.2.[0-1]* |
Plugin detection accuracy | 80 |
Plugin comment | The NASL script is Copyright (C) 2004 Tenable Network Security |
Bug produced name | Alt-N |
Bug affected | Alt-N MDaemon prior 7.2.1 |
Bug not affected | Alt-N MDaemon newer than 7.2.1 |
Bug vulnerability class | Unknown |
Bug description | The remote host is running Alt-N MDaemon, a SMTP/IMAP server for the Windows operating system family. It is reported that versions up to and including 7.2.0 are prone to local privilege escalation vulnerability. An local attacker may increase his privilege and execute code with SYSTEM privileges. |
Bug solution | Upgrade to MDaemon 7.2.1 or newer. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/11736/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 4 |
Bug simplicity | 5 |
Bug impact | 8 |
Bug risk | 5 |
Bug Nessus risk | Medium |
Bug check tools | Nessus can check this flaw with the plugin 15823 (Alt-N MDaemon Local Privilege Escalation Vulnerability). |
Source SecurityFocus BID | 11736 |
Source Nessus ID | 15823 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |