10
CVSSv2

CVE-2004-2513

Published: 31/12/2004 Updated: 19/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the IMAP service of Mercury (Pegasus) Mail 4.01 allows remote malicious users to execute arbitrary code via a long SELECT command.

Vulnerable Product Search on Vulmon Subscribe to Product

pmail pegasus 4.01

Exploits

######################################################### # ...
/** Remote Mercury32 Imap exploit [14 types of attacks] WOW! ** By: JohnH@secnetopscom ** ** Notes: Second public release and both of them are murcury32 ;) ** Again someone posted some dos code :( why bother? ** If you spent the time to look, it uses the same buffer for all 14 types of attacks and the size does not ** ...
/* Dreatica-FXP crew * * ---------------------------------------- * Target : Mercury/32 SMTP Server * Found by : muts@offensive-securitycom, wwwoffensive-securitycom * ---------------------------------------- * Exploit : Mercury/32 v332-v451 SMTP Pre-Auth EIP overwrite exploit * Exploit date : 26082007 * Exploi ...
#===== Start Mercury32_Overflowpl ===== # # Usage: Mercury32_Overflowpl <ip> <imap4 user> <imap4 pass> # Mercury32_Overflowpl 127001 hello moto # # Mercury/32, v401a, Dec 8 2003 # # Download: # wwwpmailcom/ # ############################################################# use IO::Socket; use strict; my($sock ...
/* whitehatcoil comments removed do to muts love */ /** Remote Mercury32 Imap exploit ** By: JohnH@secnetopscom **/ #include <stdioh> #include <unistdh> #include <sys/typesh> #include <sys/socketh> #include <netinet/inh> #include <netinet/tcph> #include <arpa/ineth> #include <netdbh> # ...