Vulnerabilities > CVE-2006-5961 - Unspecified vulnerability in Pegasus Mercury Mail Transport System 4.0.1B
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in Mercury Mail Transport System 4.01b for Windows has unknown impact and attack vectors, as originally reported in a GLEG VulnDisco pack. NOTE: the provenance of this information is unknown; the details are obtained from third party information. The original researcher is reliable.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Mercury Mail <= 4.01a (Pegasus) IMAP Buffer Overflow Exploit. CVE-2006-5961,CVE-2007-1373. Remote exploit for windows platform |
id | EDB-ID:1223 |
last seen | 2016-01-31 |
modified | 2005-09-20 |
published | 2005-09-20 |
reporter | c0d3r |
source | https://www.exploit-db.com/download/1223/ |
title | Mercury Mail <= 4.01a Pegasus IMAP Buffer Overflow Exploit |
Nessus
NASL family | Gain a shell remotely |
NASL id | MERCURY_IMAP_OVERFLOW.NASL |
description | The remote host is running the Mercury Mail Transport System, a free suite of server products for Windows and NetWare associated with Pegasus Mail. The remote installation of Mercury Mail includes an IMAP server that is affected by a buffer overflow flaw. Using a specially crafted LOGIN command, an unauthenticated, remote attacker can leverage this issue to crash the remote application and even execute arbitrary code remotely, subject to the privileges under which the application runs. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24785 |
published | 2007-03-09 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24785 |
title | Mercury IMAP Server LOGIN Command Remote Overflow |
code |
|