Axigen POP3 Service Remote Format String Vulnerability
BID:22603
Info
Axigen POP3 Service Remote Format String Vulnerability
| Bugtraq ID: | 22603 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 17 2007 12:00AM |
| Updated: | Feb 20 2007 08:28PM |
| Credit: | fuGich is credited with the discovery of this issue. |
| Vulnerable: |
Gecad Technologies Axigen Mail Server 2.0 -beta1 |
| Not Vulnerable: |
Gecad Technologies Axigen Mail Server 2.0 |
Discussion
Axigen POP3 Service Remote Format String Vulnerability
Axigen is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
Successfully exploiting this issue allows remote, unauthenticated attackers to execute arbitrary code with superuser privileges, since the daemon typically runs with elevated privileges. This facitates the complete compromise of affected computers.
Axigen version 2.0.0-beta1 is vulnerable to this issue; other versions may also be affected.
Axigen is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
Successfully exploiting this issue allows remote, unauthenticated attackers to execute arbitrary code with superuser privileges, since the daemon typically runs with elevated privileges. This facitates the complete compromise of affected computers.
Axigen version 2.0.0-beta1 is vulnerable to this issue; other versions may also be affected.
Exploit / POC
Axigen POP3 Service Remote Format String Vulnerability
The following exploit is available:
The following exploit is available:
Solution / Fix
Axigen POP3 Service Remote Format String Vulnerability
Solution:
Reportedly, version 2.0.0 is not affected by this issue. Symantec has not confirmed this. Users of affected packages should contact the vendor for more information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Reportedly, version 2.0.0 is not affected by this issue. Symantec has not confirmed this. Users of affected packages should contact the vendor for more information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].