[Snort-sigs] sid 1634 - POP3 PASS overflow attempt
Maarten Van Horenbeeck
maarten at ...2078...
Tue Dec 30 07:50:13 EST 2003
Rule: POP3 PASS overflow attempt
Summary: The IDS has observed a potential exploit attempt against the
Artisoft XtraMail v1.11 mailserver. This attack may lead to remote
execution of arbitrary code.
Impact: When succesfully exploited, the remote attacker can crash the POP3
service and possibly execute arbitrary code on the mailserver.
Detailed Information: The PASS argument, used to submit authentication
credentials to the POP3 server, has an overflowable buffer in XtraMail
1.11. If a password of more than 1500 characters is submitted, the
service will crash. This error may be exploitable further, and could then
allow the attacker to execute arbitrary code on the remote system, under
the LocalSystem account (which has a higher privilege level than
Affected Systems: All POP3 servers running Artisoft Xtramail 1.11 on
Attack Scenarios: An attacker could crash the POP server, thereby denying
legitimate users access to their e-mail. Skilled attackers could
compromise the mailserver and obtain all incoming e-mail data.
Ease of Attack: The DoS attack is trivial to execute, as only a password
longer than 1500 characters needs to be submitted. Compromise of the
mailserver requires more skill, but exploits are available.
False Positives: There are no false positives known for this rule.
False Negatives: There are no false negatives known for this rule.
Corrective Action: Upgrade the XtraMail installation to a more recent
version. At the time of writing, no vendor-supplied patches are
Documentation contributed by Maarten Van Horenbeeck (maarten at ...2078...)
<a href="http://cgi.nessus.org/plugins/dump.php3?id=10325">Nessus Plugin
<a href="http://www.securityfocus.com/bid/791">Bugtraq ID 791</a>
More information about the Snort-sigs