Vulnerabilities > CVE-2004-1533 - Unspecified vulnerability in Digital Mappings Systems Pop3 Server 1.5.3Build37

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
digital-mappings-systems
nessus
exploit available

Summary

Buffer overflow in pop3svr.exe for DMS POP3 1.5.3.27 and earlier allows remote attackers to cause a denial of service (service crash) via a long (1) username or (2) password.

Vulnerable Configurations

Part Description Count
Application
Digital_Mappings_Systems
1

Exploit-Db

descriptionDMS POP3 Server (1.5.3 build 37) Buffer Overflow Exploit. CVE-2004-1533. Remote exploit for windows platform
idEDB-ID:644
last seen2016-01-31
modified2004-11-21
published2004-11-21
reporterReed Arvin
sourcehttps://www.exploit-db.com/download/644/
titleDMS POP3 Server 1.5.3 build 37 - Buffer Overflow Exploit

Nessus

NASL familyGain a shell remotely
NASL idDMS_POP3_OVERFLOW.NASL
descriptionThe remote host is running Digital Mappings Systems POP3 server that has a remote buffer overrun vulnerability. An attacker, exploiting this flaw, may be crash the service.
last seen2020-06-01
modified2020-06-02
plugin id15783
published2004-11-22
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15783
titleDigital Mappings Systems POP3 Server (pop3svr.exe) Multiple Field Remote Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(15783);
 script_version ("1.12");
 script_cve_id("CVE-2004-1533");
 script_bugtraq_id( 11705 );

 script_name(english:"Digital Mappings Systems POP3 Server (pop3svr.exe) Multiple Field Remote Overflow");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote server is vulnerable to a denial of service attack." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Digital Mappings Systems POP3 server that
has a remote buffer overrun vulnerability.  An attacker, exploiting
this flaw, may be crash the service." );
 script_set_attribute(attribute:"solution", value:
"Ensure that you are running a recent and protected POP3 Server." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/18");
 script_cvs_date("Date: 2018/07/10 14:27:33");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_summary(english:"checks the banner of the remote POP3 server");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");
 script_dependencie("find_service2.nasl");
 script_require_ports("Services/pop3", 110);
 exit(0);
}

#
# The script code starts here
#
include("pop3_func.inc");

port = get_kb_item("Services/pop3");
if ( ! port ) port = 110;
if ( ! get_port_state(port) ) exit(0);

banner = get_pop3_banner(port:port);
if ( ! banner ) exit(0);
if ( egrep(pattern:"^\+OK.*DMS POP3 Server 1\.([0.4]\.|5\.([0.2]\.|3\.([0-9][^0-9]|[0-1][0-9][^0-9]|2[0-7])))", string:port) )
	security_warning(port);