5
CVSSv2

CVE-2006-4364

Published: 27/08/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon prior to 9.0.6 allow remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.

Vulnerable Product Search on Vulmon Subscribe to Product

alt-n mdaemon 3.1_beta

alt-n mdaemon 3.5.0

alt-n mdaemon 5.0.1

alt-n mdaemon 5.0.2

alt-n mdaemon 6.0

alt-n mdaemon 6.0.5

alt-n mdaemon 6.0.6

alt-n mdaemon 6.8.0

alt-n mdaemon 6.8.1

alt-n mdaemon 8.1.3

alt-n mdaemon 8.1.4

alt-n mdaemon 3.0.3

alt-n mdaemon 3.0.4

alt-n mdaemon 3.5.4

alt-n mdaemon 5.0.5

alt-n mdaemon 5.0.6

alt-n mdaemon 6.5.1

alt-n mdaemon 6.5.2

alt-n mdaemon 6.8.4

alt-n mdaemon 6.8.5

alt-n mdaemon 9.0.3

alt-n mdaemon 9.0.4

alt-n mdaemon 2.71_sp1

alt-n mdaemon 2.8

alt-n mdaemon 2.8.5.0

alt-n mdaemon 3.5.1

alt-n mdaemon 5.0.3

alt-n mdaemon 5.0.4

alt-n mdaemon 6.0.7

alt-n mdaemon 6.5.0

alt-n mdaemon 6.8.2

alt-n mdaemon 6.8.3

alt-n mdaemon 9.0.1

alt-n mdaemon 9.0.2

alt-n mdaemon 3.1.1

alt-n mdaemon 3.1.2

alt-n mdaemon 3.5.6

alt-n mdaemon 5.0

alt-n mdaemon 5.0.7

alt-n mdaemon 6.7.5

alt-n mdaemon 6.7.9

alt-n mdaemon 7.2

alt-n mdaemon 8.1.1

alt-n mdaemon 9.0.5

Exploits

# # PoC for Mdaemon POP3 preauth heap overflow # # Coded by Leon Juranic <leonjuranic@infigohr> # Infigo IS <wwwinfigohr> # # $host = '1921680105'; use IO::Socket; for ($x = 0 ; $x < 12 ; $x++) { $sock = new IO::Socket::INET (PeerAddr => $host,PeerPort => '110', Proto => 'tcp') || die "socket error\n\n"; ...
#!/usr/bin/python import sys import struct import socket from time import sleep ######################################################################################## # MDaemon Pre Authentication (USER) Heap Overflow # Code based on Leon Juranic's exploit # Coded by muts - mati@see-securitycom # wwwhackingdefinedcom # wwwremote ...