Atrium Mercur IMap Subscribe Stack Buffer Overflow Vulnerability
BID:23050
Info
Atrium Mercur IMap Subscribe Stack Buffer Overflow Vulnerability
| Bugtraq ID: | 23050 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 20 2007 12:00AM |
| Updated: | Mar 21 2007 07:43PM |
| Credit: | This issue was reported through the Imunity Partner's Program. |
| Vulnerable: |
Atrium Software MERCUR Messaging 2005 Standard Edition 5.0 SP3 Atrium Software MERCUR Messaging 2005 Lite Edition 5.0 SP3 Atrium Software MERCUR Messaging 2005 Enterprise Edition 5.0 SP3 Atrium Software MERCUR Messaging 2005 Service Pack 4 Atrium Software Mercur IMAP 0 |
| Not Vulnerable: | |
Discussion
Atrium Mercur IMap Subscribe Stack Buffer Overflow Vulnerability
Mercur IMAP is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
Currently, few technical details are available. This BID will be updated as more information becomes available.
This issue may be related to BID 7842 (Atrium Software Mercur Mailserver IMAP Remote Buffer Overflow Vulnerability).
An attacker may exploit this issue to execute arbitrary machine code in the context of the user running the application. Failed exploit attempts will likely result in denial-of-service conditions.
Mercur IMAP is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
Currently, few technical details are available. This BID will be updated as more information becomes available.
This issue may be related to BID 7842 (Atrium Software Mercur Mailserver IMAP Remote Buffer Overflow Vulnerability).
An attacker may exploit this issue to execute arbitrary machine code in the context of the user running the application. Failed exploit attempts will likely result in denial-of-service conditions.
Exploit / POC
Atrium Mercur IMap Subscribe Stack Buffer Overflow Vulnerability
The following exploit code is available for members of the Immunity Partner's Program:
https://www.immunityinc.com/downloads/immpartners/MercurImapSubscribe.tar
The following exploit is also available:
The following exploit code is available for members of the Immunity Partner's Program:
https://www.immunityinc.com/downloads/immpartners/MercurImapSubscribe.tar
The following exploit is also available:
Solution / Fix
Atrium Mercur IMap Subscribe Stack Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
References
Atrium Mercur IMap Subscribe Stack Buffer Overflow Vulnerability
References:
References:
- Immunity Partner's Page (Immunity)
- Vendor Homepage (Atrium Software)