Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:MERCURY-PH-BO

Severity

Minor

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Mercury PH Server Module Buffer Overflow

Release Date

2010/03/30

Update Number

1643

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: Mercury PH Server Module Buffer Overflow


This signature detects attempts to exploit a known vulnerability against Mercury PH Server Module. Attackers can execute arbitrary machine code with SYSTEM privileges in the context of the affected server process.

Extended Description

Mercury Mail is prone to a remote buffer-overflow vulnerability in its mailbox name service. This issue occurs because the application fails to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code with SYSTEM privileges in the context of the affected server process. Mercury Mail 4.01b is affected; other versions may also be affected.

Affected Products

  • David_harris mercury_(win32_version) 4.0.0 1a
  • David_harris mercury_(win32_version) 4.0.0 1b

References

  • BugTraq: 16396
  • CVE: CVE-2005-4411

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out