APP: MDaemon Form2Raw Message Handler Buffer Overflow
This signature detects attempts to exploit a known vulnerability against the Mdaemon mail server suite. Attackers can send an overly long "from" field in a malicious request to the form2raw script, triggering a buffer overflow and enabling the attacker to execute arbitrary commands on the target host.
Extended Description
It has been reported that MDaemon/WorldClient mail server may be prone to a buffer overflow vulnerability when handling certain messages with a 'From' field of over 249 bytes. This issue may allow a remote attacker to gain unauthorized access to a system. Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the vulnerable software in order to gain unauthorized access.
Affected Products
Alt-n mdaemon
References
BugTraq: 9317
CVE: CVE-2003-1200
URL: http://archives.neohapsis.com/archives/bugtraq/2003-12/0331.html http://www.securiteam.com/exploits/5QP0D1PCAC.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Alt-n
7.5