Plugin ID | 82 |
Plugin name | Mercur SMTP-Server 3.3 to 4.2 control service buffer overflow |
Plugin filename | Mercur SMTP-Server 3.3 to 4.2 control service buffer overflow.plugin |
Plugin filesize | 3124 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/03/23 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 25 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 *MERCUR SMTP-Server (v3.3* OR 220 *MERCUR SMTP-Server (v4.0* OR 220 *MERCUR SMTP-Server (v4.2* |
Plugin detection accuracy | 80 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug advisory | http://www.securityfocus.com/archive/1/282988 |
Bug affected | Mercur SMTP-Server 3.3 to 4.2 |
Bug not affected | Mercur SMTP-Server 4.2 and newer |
Bug vulnerability class | Buffer Overflow |
Bug description | The Mercur Mailserver is a small Mail Transfer Agent (MTA). It has been reported that there is an insufficient bounds checking in the Control-Service component, which listens on TCP port 32000 by default. An attacker may use this buffer overflow by sending an very long username/password to run arbritrary code with the server privileges. |
Bug solution | It may be possible that there is a new software version available. At the moment the vulnerability is only reported for MERCUR Mailserver 3.3 to 4.2. Please visit the web site of Atrium Software at http://www.atrium-software.com/mercur/mercur_e.html. Limit unwanted connections and communications with firewalling. |
Bug fixing time | 1 hour |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/data/vulnerabilities/exploits/mercrexp.c |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 5 |
Bug simplicity | 8 |
Bug impact | 9 |
Bug risk | 6 |
Source CVE | CAN-2002-1073 |
Source SecurityFocus BID | 5261 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |