CERTA-2007-AVI-008
Vulnerability from certfr_avis - Published: 2007-01-08 - Updated: 2007-01-08
Un débordement de mémoire permet à un utilisateur malveillant d'exécuter un code arbitraire à distance.
Description
Eudora Worldmail 3.1.x Mail Management Server est le programme d'administration du serveur de messagerie Eudora Worldmail. Le programme, MAILMA.EXE écoute sur le port 106/TCP. Une erreur dans l'analyseur lexical (parser) permet de provoquer un débordement de mémoire en fabriquant une requête contenant un nombre élevé de délimiteurs. Ce débordement permet à un utilisateur malveillant non authentifié d'exécuter à distance un code arbitraire sur le système vulnérable.
Contournement provisoire
Filtrer au niveau du réseau pour n'autoriser l'accès au port 106/TCP qu'aux sources de confiance.
Eudora Worldmail 3.1.x Mail Management Server
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003eEudora Worldmail 3.1.x Mail Management Server\u003c/SPAN\u003e",
"content": "## Description\n\nEudora Worldmail 3.1.x Mail Management Server est le programme\nd\u0027administration du serveur de messagerie Eudora Worldmail. Le\nprogramme, MAILMA.EXE \u00e9coute sur le port 106/TCP. Une erreur dans\nl\u0027analyseur lexical (parser) permet de provoquer un d\u00e9bordement de\nm\u00e9moire en fabriquant une requ\u00eate contenant un nombre \u00e9lev\u00e9 de\nd\u00e9limiteurs. Ce d\u00e9bordement permet \u00e0 un utilisateur malveillant non\nauthentifi\u00e9 d\u0027ex\u00e9cuter \u00e0 distance un code arbitraire sur le syst\u00e8me\nvuln\u00e9rable.\n\n## Contournement provisoire\n\nFiltrer au niveau du r\u00e9seau pour n\u0027autoriser l\u0027acc\u00e8s au port 106/TCP\nqu\u0027aux sources de confiance.\n",
"cves": [],
"initial_release_date": "2007-01-08T00:00:00",
"last_revision_date": "2007-01-08T00:00:00",
"links": [
{
"title": "Avis de s\u00e9curit\u00e9 Secunia SA23622 du 6 janvier 2007 :",
"url": "http://secunia.com/advisories/23622/"
}
],
"reference": "CERTA-2007-AVI-008",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Un d\u00e9bordement de m\u00e9moire permet \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter\nun code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 de Eudora Mail Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis Secunia 23622",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…