Avirt Mail 'Mail From:' and 'Rcpt to:' DoS Vulnerability
BID:1825
Info
Avirt Mail 'Mail From:' and 'Rcpt to:' DoS Vulnerability
| Bugtraq ID: | 1825 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Oct 23 2000 12:00AM |
| Updated: | Oct 23 2000 12:00AM |
| Credit: | Posted to Bugtraq on October 23, 2000 by Martin <[email protected]>. |
| Vulnerable: |
Avirt Mail 4.2 Avirt Mail 4.0 |
| Not Vulnerable: | |
Discussion
Avirt Mail 'Mail From:' and 'Rcpt to:' DoS Vulnerability
Due to insufficient bounds checking in the code that handles the fields 'MAIL FROM:' and 'RCPT TO:', it is possible to remotely crash Avirt Mail.
Entering over 272 characters into the 'RCPT TO:' field will crash the application upon termination of the session and no further connections can be initiated until Avirt Mail is restarted. This is also the case with the 'MAIL FROM' field with the exception that over 556 characters must be entered.
Due to insufficient bounds checking in the code that handles the fields 'MAIL FROM:' and 'RCPT TO:', it is possible to remotely crash Avirt Mail.
Entering over 272 characters into the 'RCPT TO:' field will crash the application upon termination of the session and no further connections can be initiated until Avirt Mail is restarted. This is also the case with the 'MAIL FROM' field with the exception that over 556 characters must be entered.
Exploit / POC
Avirt Mail 'Mail From:' and 'Rcpt to:' DoS Vulnerability
Martin <[email protected]> has released the following exploit:
Martin <[email protected]> has released the following exploit:
Solution / Fix
Avirt Mail 'Mail From:' and 'Rcpt to:' DoS Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].