header-logo
Suggest Exploit
vendor:
IMail
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: IMail
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001

IMail ldap Service Buffer Overflow Vulnerability

The IMail ldap service has an unchecked buffer, resulting in a classic buffer overflow vulnerability. An attacker can exploit this vulnerability by telnetting to the target machine on port 389 and sending a string of 2375 characters followed by the letter 'Y' twice. This will cause the ldap service to consume 90% of the system resources, rendering the system unusable.

Mitigation:

Upgrade to the latest version of IMail.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/503/info

The IMail ldap service has an unchecked buffer, resulting in a classic buffer overflow vulnerability. While it does not crash the service, it drives CPU utilization up rendering the system essentially unusable.

Telnet to target machine, port 389
Send: Y glob1
hit enter twice
Server Returns: 0
Send: Y glob2
hit enter

Where glob1 and glob2 are 2375 characters and Y is Y. The ldap service goes to 90 percent or so and idles there. Therefore using up most system resources.