Vulnerabilities > CVE-2006-0141 - Denial of Service vulnerability in Eudora Internet Mail Server 3.2.6/3.2.7/3.2.8

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
eudora
nessus

Summary

Qualcomm Eudora Internet Mail Server (EIMS) before 3.2.8 allows remote attackers to cause a denial of service (crash) via (1) malformed NTLM authentication requests, or a malformed (2) Incoming Mail X or (3) Temporary Mail file.

Nessus

NASL familySMTP problems
NASL idEIMS_328.NASL
descriptionThe remote host appears to be running Eudora Internet Mail Server, a mail server for Macs. According to its banner, the version of Eudora Internet Mail Server (EIMS) installed on the remote host is reportedly susceptible to denial of service attacks involving malformed NTLM authentication requests as well as corrupted incoming MailX and temporary mail files. While not certain, the first issue is likely to be remotely exploitable.
last seen2020-06-01
modified2020-06-02
plugin id20394
published2006-01-11
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/20394
titleEudora Internet Mail Server (EIMS) < 3.2.8 Multiple DoS
code
#
# (C) Tenable Network Security, Inc.
#



include("compat.inc");

if (description) {
  script_id(20394);
  script_version("1.15");

  script_cve_id("CVE-2006-0141");
  script_bugtraq_id(16179);

  script_name(english:"Eudora Internet Mail Server (EIMS) < 3.2.8 Multiple DoS");
  script_summary(english:"Checks for multiple denial of service vulnerabilities in Eudora Internet Mail Server < 3.2.8");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote mail server is affected by multiple denial of service flaws." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running Eudora Internet Mail Server, a
mail server for Macs. 

According to its banner, the version of Eudora Internet Mail Server
(EIMS) installed on the remote host is reportedly susceptible to denial
of service attacks involving malformed NTLM authentication requests as
well as corrupted incoming MailX and temporary mail files.  While not
certain, the first issue is likely to be remotely exploitable." );
 script_set_attribute(attribute:"see_also", value:"http://www.eudora.co.nz/updates.html" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to EIMS version 3.2.8 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/01/11");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/01/09");
 script_cvs_date("Date: 2018/08/22 16:49:14");
 script_set_attribute(attribute:"plugin_type", value: "remote");
 script_end_attributes();

 
  script_category(ACT_GATHER_INFO);
  script_family(english:"SMTP problems");
  script_copyright(english:"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_dependencies("smtpserver_detect.nasl", "popserver_detect.nasl", "imap4_banner.nasl");
  script_require_ports("Services/smtp", 25, 106, "Services/pop3", 110, "Services/imap", 143);

  exit(0);
}

include("global_settings.inc");
include("imap_func.inc");
include("misc_func.inc");
include("pop3_func.inc");
include("smtp_func.inc");


# Do banner checks of various ports.
#
# - SMTP.
port = get_kb_item("Services/smtp");
if (!port) port = 25;
banner = get_smtp_banner(port:port);
if (
  banner && 
  egrep(pattern:"^[0-9][0-9][0-9] .* running Eudora Internet Mail Server.* ([0-2]\.|3.([0-1]\.|2\.[0-7]))", string:banner)
) {
  security_warning(port);
  exit(0);
}
# - IMAP.
port = get_kb_item("Services/imap");
if (!port) port = 143;
banner = get_imap_banner(port:port);
if (
  banner && 
  egrep(pattern:"^\* OK .* running Eudora Internet Mail Server.* ([0-2]\.|3.([0-1]\.|2\.[0-7]))", string:banner)
) {
  security_warning(port);
  exit(0);
}
# - POP3.
port = get_kb_item("Services/pop3");
if (!port) port = 110;
banner = get_pop3_banner(port:port);
if (
  banner && 
  egrep(pattern:"^\+OK .* running Eudora Internet Mail Server.* ([0-2]\.|3.([0-1]\.|2\.[0-7]))", string:banner)
) {
  security_warning(port);
  exit(0);
}
# - ACAP
port = get_kb_item("Services/acap");
if (! port) port = 674;
banner = get_unknown_banner(port:port);
if (
  banner && 
  egrep(pattern:"IMPLEMENTATION Eudora Internet Mail Server.* ([0-2]\.|3.([0-1]\.|2\.[0-7]))", string:banner)
) {
  security_warning(port);
  exit(0);
}
# - POP3 password
port = get_kb_item("Services/pop3pw");
if (! port) port = 106;
banner = get_unknown_banner(port:port);
if (
  banner && 
  egrep(pattern:"^[0-9][0-9][0-9] .* running Eudora Internet Mail Server.* ([0-2]\.|3.([0-1]\.|2\.[0-7]))", string:banner)
) {
  security_warning(port);
  exit(0);
}