Vulnerabilities > CVE-2008-2859 - Unspecified vulnerability in Netwin Surgemail
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in the IMAP service in NetWin SurgeMail before 3.9g2 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors related to an "imap command."
Vulnerable Configurations
Exploit-Db
description | Surgemail 39e-1 Post Auth IMAP Remote Buffer Overflow DoS. CVE-2008-2859,CVE-2008-7182. Dos exploit for windows platform |
file | exploits/windows/dos/5968.py |
id | EDB-ID:5968 |
last seen | 2016-01-31 |
modified | 2008-06-30 |
platform | windows |
port | |
published | 2008-06-30 |
reporter | Travis Warren |
source | https://www.exploit-db.com/download/5968/ |
title | Surgemail 39e-1 Post Auth IMAP Remote Buffer Overflow DoS |
type | dos |
Nessus
NASL family | Misc. |
NASL id | SURGEMAIL_IMAP_COMMAND_UNSPECIFIED_DOS.NASL |
description | According to its banner, the remote host is running a version of the SurgeMail Mail Server older than 3.9g2. The IMAP service in such versions is reportedly affected by remote denial of service vulnerabilities when handling an APPEND command with a large parameter. An authenticated attacker can leverage this issue to crash the remote application. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 33277 |
published | 2008-06-30 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/33277 |
title | SurgeMail IMAP Service APPEND Command Remote DoS |
code |
|
References
- http://secunia.com/advisories/30739
- http://secunia.com/advisories/30739
- http://www.netwinsite.com/surgemail/help/updates.htm
- http://www.netwinsite.com/surgemail/help/updates.htm
- http://www.securityfocus.com/bid/29805
- http://www.securityfocus.com/bid/29805
- http://www.securitytracker.com/id?1020335
- http://www.securitytracker.com/id?1020335
- http://www.vupen.com/english/advisories/2008/1874/references
- http://www.vupen.com/english/advisories/2008/1874/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43171
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43171