Vulnerabilities > CVE-2003-0391 - Denial-Of-Service vulnerability in Magic Winmail Server

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
amax-information-technologies
nessus
exploit available

Summary

Format string vulnerability in Magic WinMail Server 2.3, and possibly other 2.x versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the PASS command.

Vulnerable Configurations

Part Description Count
Application
Amax_Information_Technologies
1

Exploit-Db

descriptionWinmail Mail Server 2.3 Remote Format String Exploit. CVE-2003-0391. Remote exploit for windows platform
idEDB-ID:42
last seen2016-01-31
modified2003-06-11
published2003-06-11
reporterThreaT
sourcehttps://www.exploit-db.com/download/42/
titleWinmail Mail Server 2.3 - Remote Format String Exploit

Nessus

NASL familyWindows
NASL idMAGIC_WINMAIL_POP_FORMAT_STRING.NASL
descriptionThe remote Winmail POP server, according to its banner, is vulnerable to a format string attack when processing the USER command. An unauthenticated attacker may use this flaw to execute arbitrary code on this host.
last seen2020-06-01
modified2020-06-02
plugin id11742
published2003-06-17
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11742
titleMagic Winmail Server PASS Command Remote Format String
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(11742);
 script_version ("1.16");
 script_cve_id("CVE-2003-0391");
 script_bugtraq_id(7667);
 
 script_name(english:"Magic Winmail Server PASS Command Remote Format String");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote mail server is prone to a format string attack." );
 script_set_attribute(attribute:"description", value:
"The remote Winmail POP server, according to its banner, is vulnerable
to a format string attack when processing the USER command. 

An unauthenticated attacker may use this flaw to execute arbitrary
code on this host." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2003/May/251" );
 script_set_attribute(attribute:"see_also", value:"http://www.magicwinmail.net/changelog.asp" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to WinMail version 2.4 (Build 0530) or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/06/17");
 script_set_attribute(attribute:"patch_publication_date", value: "2003/05/30");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/05/25");
 script_cvs_date("Date: 2018/11/15 20:50:27");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Magic WinMail banner check");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows");
 script_dependencie("find_service1.nasl");
 script_require_ports("Services/pop3", 110);
 exit(0);
}

#
# The script code starts here
#

port = get_kb_item("Services/pop3");
if(!port)port = 110;

banner = get_kb_item(string("pop3/banner/", port));
if(!banner)
{
    if(get_port_state(port))
    {
	soc = open_sock_tcp(port);
	if(!soc)exit(0);
	banner = recv_line(socket:soc, length:4096);
    }
}

if(banner)
{
    if(ereg(pattern:".*Magic Winmail Server (1\..*|2\.[0-3][^0-9])", string:banner, icase:TRUE))
    {
	security_hole(port);
    }
}