Short Name |
IMAP:OVERFLOW:MERCURY-MAIL-BO |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
IMAP |
Keywords |
Mercury Mail IMAP Command Buffer Overflow |
Release Date |
2013/06/18 |
Update Number |
2274 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Mercury Mail Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Mercury Mail is reported susceptible to multiple stack-based buffer-overflow vulnerabilities in its IMAP server implementation. These issues are due to the application's failure to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting these vulnerabilities allows authenticated, remote attackers to execute arbitrary machine code in the context of the affected server process. Versions prior to 4.01a of Mercury Mail are reported affected by these vulnerabilities; other versions may also be affected. Note: BID 11788 has been consolidated with this BID; they actually represent the same issues.