IMAP: Mercury Login Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Mercury Mail Transport System. A successful attack allows attackers to execute arbitrary code through a long LOGIN command. The foundation for this signature comes from the public PoC for Metasploit.

Extended Description

Mercury Mail Transport System is prone to a remote buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker may exploit this issue to execute arbitrary machine code in the context of the user running the application. Failed exploit attempts will likely result in denial-of-service conditions. Version 4.01b is vulnerable; other versions may also be affected.

Affected Products

Pegasus_mail mercury_mail_transport_system

References

BugTraq: 21110

CVE: CVE-1999-1557

Short Name
IMAP:OVERFLOW:MERCURY-LOGIN
Severity
Critical
Recommended
False
Recommended Action
None
Category
IMAP
Keywords
Buffer CVE-1999-1557 CVE-2006-5961 CVE-2007-1373 Login Mercury Overflow bid:21110
Release Date
03/25/2010
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Pegasus_mail

CVSS Score

7.5

10.0

5.0

Found a potential security threat?