Summary
This host is running WorldMail IMAP Server and prone to buffer overflow vulnerability.
Impact
Successful exploitation may allow remote attackers to execute arbitrary code within the context of the application or cause a denial of service condition.
Impact Level: System/Application
Solution
Upgrade to Eudora WorldMail Server version 4.0 or later.
For updates refer to http://www.eudora.com/worldmail/
Insight
The flaw is due to a boundary error when processing user supplied IMAP commands. This can be exploited to cause a stack-based overflow via a long string containing a '}' character.
Affected
Eudora WorldMail Server 3.0
References
Severity
Classification
-
CVE CVE-2005-4267 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- BaoFeng Storm '.smpl' File Buffer Overflow Vulnerability
- BigAnt IM Server HTTP GET Request Buffer Overflow Vulnerability
- Cyrus IMAP Server 'split_wildmats()' Remote Buffer Overflow Vulnerability
- Avaya WinPDM Multiple Buffer Overflow Vulnerabilities
- Adobe Reader 'File Extension' Buffer Overflow Vulnerability (Mac OS X)