Vulnerabilities > CVE-2005-4411 - Remote Mailbox Name Service Buffer Overflow vulnerability in David Harris Mercury Mail Transport System 4.01B

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
david-harris
nessus
exploit available
metasploit

Summary

Buffer overflow in Mercury Mail Transport System 4.01b allows remote attackers to execute arbitrary code via a long request to TCP port 105.

Vulnerable Configurations

Part Description Count
Application
David_Harris
1

Exploit-Db

  • descriptionMercury/32. CVE-2005-4411. Remote exploit for windows platform
    idEDB-ID:16419
    last seen2016-02-01
    modified2010-06-15
    published2010-06-15
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16419/
    titleMercury/32 <= 4.01b - PH Server Module Buffer Overflow
  • descriptionMercury Mail Transport System 4.01b Remote Exploit (PH SERVER). CVE-2005-4411. Remote exploit for windows platform
    fileexploits/windows/remote/1375.pl
    idEDB-ID:1375
    last seen2016-01-31
    modified2005-12-16
    platformwindows
    port105
    published2005-12-16
    reporterkingcope
    sourcehttps://www.exploit-db.com/download/1375/
    titleMercury Mail Transport System 4.01b Remote Exploit PH SERVER
    typeremote

Metasploit

descriptionThis module exploits a stack-based buffer overflow in Mercury/32 <= v4.01b PH Server Module. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer.
idMSF:EXPLOIT/WINDOWS/MISC/MERCURY_PHONEBOOK
last seen2020-01-13
modified2017-07-24
published2006-10-15
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4411
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/misc/mercury_phonebook.rb
titleMercury/32 PH Server Module Buffer Overflow

Nessus

NASL familyGain a shell remotely
NASL idMERCURY_PH_OVERFLOW.NASL
descriptionThe remote host is running the Mercury Mail Transport System, a free suite of server products for Windows and Netware associated with Pegasus Mail. The remote installation of Mercury includes a ph server that is vulnerable to buffer overflow attacks. By leveraging this issue, an unauthenticated, remote attacker is able to crash the remote service and possibly execute arbitrary code remotely.
last seen2020-06-01
modified2020-06-02
plugin id20812
published2006-01-27
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20812
titleMercury Mail ph Server Remote Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83209/mercury_phonebook.rb.txt
idPACKETSTORM:83209
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83209/Mercury-32-v4.01b-PH-Server-Module-Buffer-Overflow.html
titleMercury/32 <= v4.01b PH Server Module Buffer Overflow

Saint

bid16396
descriptionMercury Mail Transport System Phonebook service buffer overflow
idmail_misc_mercuryqsds
osvdb22103
titlemercury_mail_phonebook
typeremote