ID CVE-2007-1373
Summary Stack-based buffer overflow in Mercury/32 (aka Mercury Mail Transport System) 4.01b and earlier allows remote attackers to execute arbitrary code via a long LOGIN command. NOTE: this might be the same issue as CVE-2006-5961.
References
Vulnerable Configurations
  • cpe:2.3:a:pmail:mercury_mail_transport_system:4.01b
    cpe:2.3:a:pmail:mercury_mail_transport_system:4.01b
CVSS
Base: 10.0 (as of 12-03-2007 - 10:38)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description Mercury Mail <= 4.01a (Pegasus) IMAP Buffer Overflow Exploit. CVE-2006-5961,CVE-2007-1373. Remote exploit for windows platform
    id EDB-ID:1223
    last seen 2016-01-31
    modified 2005-09-20
    published 2005-09-20
    reporter c0d3r
    source https://www.exploit-db.com/download/1223/
    title Mercury Mail <= 4.01a Pegasus IMAP Buffer Overflow Exploit
  • description Mercury/32 Mail Server <= 4.01b (check) Buffer Overflow Exploit PoC. CVE-2007-1373. Dos exploit for windows platform
    id EDB-ID:3418
    last seen 2016-01-31
    modified 2007-03-06
    published 2007-03-06
    reporter mu-b
    source https://www.exploit-db.com/download/3418/
    title Mercury/32 Mail Server <= 4.01b check Buffer Overflow Exploit PoC
  • description Mercury/32. CVE-2007-1373. Remote exploit for windows platform
    id EDB-ID:16473
    last seen 2016-02-01
    modified 2010-06-22
    published 2010-06-22
    reporter metasploit
    source https://www.exploit-db.com/download/16473/
    title Mercury/32 <= 4.01b - LOGIN Buffer Overflow
metasploit via4
description This module exploits a stack buffer overflow in Mercury/32 <= 4.01b IMAPD LOGIN verb. By sending a specially crafted login command, a buffer is corrupted, and code execution is possible. This vulnerability was discovered by (mu-b at digit-labs.org).
id MSF:EXPLOIT/WINDOWS/IMAP/MERCURY_LOGIN
last seen 2019-03-07
modified 2018-10-28
published 2007-05-07
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/imap/mercury_login.rb
title Mercury/32 4.01 IMAP LOGIN SEH Buffer Overflow
packetstorm via4
data source https://packetstormsecurity.com/files/download/83126/mercury_login.rb.txt
id PACKETSTORM:83126
last seen 2016-12-05
published 2009-11-26
reporter MC
source https://packetstormsecurity.com/files/83126/Mercury-32-4.01b-LOGIN-Buffer-Overflow.html
title Mercury/32 <= 4.01b LOGIN Buffer Overflow
refmap via4
fulldisc 20070306 Mercury/32 4.01b
osvdb 33883
secunia 24367
sreason 2398
xf mercury-imap-bo(32848)
saint via4
description Mercury IMAP data continuation buffer overflow
id mail_imap_mercury
osvdb 33883
title mercury_imap_continuation
type remote
Last major update 13-11-2008 - 01:34
Published 09-03-2007 - 19:19
Last modified 28-07-2017 - 21:30
Back to Top