Upgrade to SurgeMail 3.8k2 / 3.8m or later. An authenticated attacker can leverage this issue to crash the remote application and possibly execute arbitrary code remotely, subject to the privileges under which the application runs. Such versions are reportedly affected by a buffer overflow flaw in its IMAP service that can be triggered using a specially crafted 'SEARCH' command. DescriptionĪccording to its banner, the remote host is running a version of the SurgeMail Mail Server older than 3.8k2 / 3.8m. The remote mail server is affected by a buffer overflow vulnerability. Name: SurgeMail IMAP Server SEARCH Command Remote Buffer Overflowįilename: surgemail_imap_search_overflow.naslĭependencies: find_service2.nasl Vulnerability Information Why your exploit completed, but no session was created?.Nessus CSV Parser and Extractor (yanp.sh).Default Password Scanner (default-http-login-hunter.sh).SSH Brute Force Attack Tool using PuTTY / Plink (ssh-putty-brute.ps1).SMB Brute Force Attack Tool in PowerShell (SMBLogin.ps1).Windows Local Admin Brute Force Attack Tool (LocalBrute.ps1).Active Directory Brute Force Attack Tool in PowerShell (ADLogin.ps1).Solution for SSH Unable to Negotiate Errors.Spaces in Passwords – Good or a Bad Idea?.Security Operations Center: Challenges of SOC Teams.SSH Sniffing (SSH Spying) Methods and Defense.Detecting Network Attacks with Wireshark.Solving Problems with Office 365 Email from GoDaddy.Exploits, Vulnerabilities and Payloads: Practical Introduction.
0 Comments
Leave a Reply. |