Vulnerabilities > CVE-2003-0391 - Unspecified vulnerability in Amax Information Technologies Magic Winmail Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Format string vulnerability in Magic WinMail Server 2.3, and possibly other 2.x versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the PASS command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Winmail Mail Server 2.3 Remote Format String Exploit. CVE-2003-0391. Remote exploit for windows platform |
id | EDB-ID:42 |
last seen | 2016-01-31 |
modified | 2003-06-11 |
published | 2003-06-11 |
reporter | ThreaT |
source | https://www.exploit-db.com/download/42/ |
title | Winmail Mail Server 2.3 - Remote Format String Exploit |
Nessus
NASL family | Windows |
NASL id | MAGIC_WINMAIL_POP_FORMAT_STRING.NASL |
description | The remote Winmail POP server, according to its banner, is vulnerable to a format string attack when processing the USER command. An unauthenticated attacker may use this flaw to execute arbitrary code on this host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11742 |
published | 2003-06-17 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11742 |
title | Magic Winmail Server PASS Command Remote Format String |
code |
|