Vulnerabilities > CVE-2004-2441 - Unspecified vulnerability in Kerio Mailserver 6.0/6.0.1/6.0.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
kerio
nessus

Summary

Unspecified vulnerability in Kerio MailServer before 6.0.3 has unknown impact and unknown remote attack vectors, related to a "potential security issue."

Vulnerable Configurations

Part Description Count
Application
Kerio
3

Nessus

NASL familySMTP problems
NASL idKERIO_KMS_UNDISCLOSED_FLAW.NASL
descriptionThe remote host is running a version of Kerio MailServer prior to 6.0.3. There is an undisclosed flaw in the remote version of this server that might allow an attacker to execute arbitrary code on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id15404
published2004-10-01
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15404
titleKerio MailServer < 6.0.3 Unspecified Vulnerability
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(15404);
 script_version ("1.16");

 script_cve_id("CVE-2004-2441");
 script_bugtraq_id(11300);

 script_name(english:"Kerio MailServer < 6.0.3 Unspecified Vulnerability");
 script_summary(english:"Checks for Kerio MailServer < 6.0.3");
 
 script_set_attribute(
  attribute:"synopsis",
  value:"The remote mail server has an unspecified vulnerability."
 );
 script_set_attribute(
  attribute:"description", 
  value:
"The remote host is running a version of Kerio MailServer prior to
6.0.3. 

There is an undisclosed flaw in the remote version of this server that
might allow an attacker to execute arbitrary code on the remote host."
 );
 script_set_attribute(
  attribute:"see_also", 
  value:"http://www.kerio.com/mailserver/history"
 );
 script_set_attribute(
  attribute:"solution", 
  value:"Upgrade to Kerio MailServer 6.0.3 or newer."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(
  attribute:"vuln_publication_date", 
  value:"2004/09/30"
 );
 script_set_attribute(
  attribute:"patch_publication_date", 
  value:"2004/09/30"
 );
 script_set_attribute(
  attribute:"plugin_publication_date", 
  value:"2004/10/01"
 );
 script_cvs_date("Date: 2018/07/12 19:01:16");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:kerio:kerio_mailserver");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"SMTP problems");
 script_dependencie("smtpserver_detect.nasl");
 script_require_ports("Services/smtp", 25);
 exit(0);
}

include("global_settings.inc");
include("smtp_func.inc");

port = get_kb_item("Services/smtp");
if(!port) port = 25;
banner = get_smtp_banner(port:port);
if ( ! banner) exit(0);
if (egrep(string:banner, pattern:"^220 .* Kerio MailServer ([0-5]\.[0-9]\.[0-9]|6\.0\.[0-2]) ESMTP ready") )
	{
		security_hole(port);
		exit(0);
	}