Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:OVERFLOW:MERCURY-MAIL-BO

Severity

High

Recommended

No

Recommended Action

Drop

Category

IMAP

Keywords

Mercury Mail IMAP Command Buffer Overflow

Release Date

2013/06/18

Update Number

2274

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: Mercury Mail IMAP Command Buffer Overflow


This signature detects attempts to exploit a known vulnerability in the Mercury Mail Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Mercury Mail is reported susceptible to multiple stack-based buffer-overflow vulnerabilities in its IMAP server implementation. These issues are due to the application's failure to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting these vulnerabilities allows authenticated, remote attackers to execute arbitrary machine code in the context of the affected server process. Versions prior to 4.01a of Mercury Mail are reported affected by these vulnerabilities; other versions may also be affected. Note: BID 11788 has been consolidated with this BID; they actually represent the same issues.

Affected Products

  • David Harris Mercury (win32 version) 4.0.0 1
  • David Harris Mercury (win32 version) 4.0.0 1a

References

  • BugTraq: 11775
  • CVE: CVE-2004-1211

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out