Vulnerabilities > CVE-2003-0391 - Denial-Of-Service vulnerability in Magic Winmail Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Format string vulnerability in Magic WinMail Server 2.3, and possibly other 2.x versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the PASS command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Winmail Mail Server 2.3 Remote Format String Exploit. CVE-2003-0391. Remote exploit for windows platform |
id | EDB-ID:42 |
last seen | 2016-01-31 |
modified | 2003-06-11 |
published | 2003-06-11 |
reporter | ThreaT |
source | https://www.exploit-db.com/download/42/ |
title | Winmail Mail Server 2.3 - Remote Format String Exploit |
Nessus
NASL family | Windows |
NASL id | MAGIC_WINMAIL_POP_FORMAT_STRING.NASL |
description | The remote Winmail POP server, according to its banner, is vulnerable to a format string attack when processing the USER command. An unauthenticated attacker may use this flaw to execute arbitrary code on this host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11742 |
published | 2003-06-17 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11742 |
title | Magic Winmail Server PASS Command Remote Format String |
code |
|