Vulnerabilities > CVE-2006-6336 - Remote Heap-Based Buffer Overflow vulnerability in Eudora Worldmail Management Server 3.1

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
eudora
critical
nessus

Summary

Heap-based buffer overflow in the Mail Management Server (MAILMA.exe) in Eudora WorldMail 3.1.x allows remote attackers to execute arbitrary code via a crafted request containing successive delimiters.

Vulnerable Configurations

Part Description Count
Application
Eudora
1

Nessus

NASL familyWindows
NASL idWORLDMAIL_MAILMA_OVERFLOW.NASL
descriptionThe remote host is running Eudora WorldMail, a commercial mail server for Windows. According to its banner, the version of Eudora Worldmail installed on the remote host contains a heap-based buffer overflow flaw in its Mail Management Agent. Using a specially crafted request, an unauthenticated, remote attacker may be able to leverage this issue to crash the affected service or execute arbitrary code on the remote host. Since the service runs with LOCAL SYSTEM privileges by default, this could lead to a complete compromise of the affected host.
last seen2020-06-01
modified2020-06-02
plugin id24757
published2007-03-05
reporterThis script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/24757
titleEudora WorldMail Mail Management Server (MAILMA.exe) Remote Overflow