IMAP: Atrium Software MERCUR IMAPD NTLMSSP Command Handling Memory Corruption

This signature detects attempts to exploit a known vulnerability in the Atrium Software MERCUR IMAP Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution.

Extended Description

Mercur IMAPD is prone to a remote buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker may exploit this issue to execute arbitrary machine code in the context of the user running the application. Failed exploit attempts will likely result in denial-of-service conditions. Version 1 SP4 is vulnerable; other versions may also be affected.

Affected Products

Atrium_software mercur_imapd

References

BugTraq: 23058

CVE: CVE-2007-1578

Short Name
IMAP:OVERFLOW:MERCUR-NTLMSSP
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
IMAP
Keywords
Atrium CVE-2007-1578 Command Corruption Handling IMAPD MERCUR Memory NTLMSSP Software bid:23058
Release Date
10/06/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Atrium_software

CVSS Score

10.0

Found a potential security threat?