Short Name |
SMTP:EXPLOIT:DMAIL-FS |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
NetWin DMail DSMTP Remote Format String |
Release Date |
2005/08/11 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects a maliciously crafted SMTP "xtellmail" request containing format string characters. Such a request can allow the client to execute arbitrary commands on the server with permissions of the SMTP daemon. This vulnerability affects NetWin DMail DSMTP versions 3.1b and earlier.
The SMTP server (dsmtp.exe) shipped with DMail is reportedly prone to a remote format string vulnerability. Specifically, this issue arises when the application handles malicious data passed through various administrative commands. A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access or privilege escalation in the context the server. It should be noted that exploitation of this vulnerability requires the attacker to have the DMail administrative password.