SMTP: NetWin DMail DSMTP Remote Format String

This signature detects a maliciously crafted SMTP "xtellmail" request containing format string characters. Such a request can allow the client to execute arbitrary commands on the server with permissions of the SMTP daemon. This vulnerability affects NetWin DMail DSMTP versions 3.1b and earlier.

Extended Description

The SMTP server (dsmtp.exe) shipped with DMail is reportedly prone to a remote format string vulnerability. Specifically, this issue arises when the application handles malicious data passed through various administrative commands. A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access or privilege escalation in the context the server. It should be noted that exploitation of this vulnerability requires the attacker to have the DMail administrative password.

Affected Products

Netwin dmail

Short Name
SMTP:EXPLOIT:DMAIL-FS
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMTP
Keywords
CVE-2005-1478 DMail DSMTP Format NetWin Remote String bid:13505
Release Date
08/11/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Netwin

CVSS Score

7.5

Found a potential security threat?