Vulnerabilities > CVE-2004-1533 - Unspecified vulnerability in Digital Mappings Systems Pop3 Server 1.5.3Build37
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in pop3svr.exe for DMS POP3 1.5.3.27 and earlier allows remote attackers to cause a denial of service (service crash) via a long (1) username or (2) password.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | DMS POP3 Server (1.5.3 build 37) Buffer Overflow Exploit. CVE-2004-1533. Remote exploit for windows platform |
id | EDB-ID:644 |
last seen | 2016-01-31 |
modified | 2004-11-21 |
published | 2004-11-21 |
reporter | Reed Arvin |
source | https://www.exploit-db.com/download/644/ |
title | DMS POP3 Server 1.5.3 build 37 - Buffer Overflow Exploit |
Nessus
NASL family | Gain a shell remotely |
NASL id | DMS_POP3_OVERFLOW.NASL |
description | The remote host is running Digital Mappings Systems POP3 server that has a remote buffer overrun vulnerability. An attacker, exploiting this flaw, may be crash the service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15783 |
published | 2004-11-22 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15783 |
title | Digital Mappings Systems POP3 Server (pop3svr.exe) Multiple Field Remote Overflow |
code |
|
References
- http://marc.info/?l=bugtraq&m=110081437508585&w=2
- http://marc.info/?l=bugtraq&m=110081437508585&w=2
- http://secunia.com/advisories/13248
- http://secunia.com/advisories/13248
- http://www.digitalmapping.sk.ca/pop3srv/Update.asp
- http://www.digitalmapping.sk.ca/pop3srv/Update.asp
- http://www.securityfocus.com/bid/11705
- http://www.securityfocus.com/bid/11705
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18161
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18161