Short Name |
APP:MDAEMON:SEND-OF |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
MDaemon Mail Server Overflow |
Release Date |
2004/09/30 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against the MDaemon mail server. MDaemon 6.7.9 and older versions are vulnerable. Attackers can send an overly long SMTP, SAML, SOML, or SEND command to overflow the buffer and crash the MDaemon service; attackers can also obtain complete server control with SYSTEM level access.
A vulnerability in the MDaemon email server is caused by user-supplied strings which are improperly checked. This could enable an attacker to cause a denial of service, or execute arbitrary commands on a system with the privileges of the current account running the MDaemon email server.