header-logo
Suggest Exploit
vendor:
Perdition IMAP Proxy Server
by:
Unknown
7.5
CVSS
HIGH
Remote Format String
Unknown
CWE
Product Name: Perdition IMAP Proxy Server
Affected Version From: 1.17
Affected Version To: 1.17
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Perdition IMAP Proxy Server Remote Format String Vulnerability

Perdition IMAP proxy server is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. An attacker can exploit this issue to execute arbitrary machine code in the context of the affected application. A successful attack will compromise the application. Failed attempts may cause denial-of-service conditions.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26270/info

Perdition IMAP proxy server is prone to a remote format-string vulnerability because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

An attacker can exploit this issue to execute arbitrary machine code in the context of the affected application. A successful attack will compromise the application. Failed attempts may cause denial-of-service conditions.

This issue affects Perdition 1.17 and prior versions. 

The following proof of concept is available:

perl -e 'print "abc%n\x00\n"' | nc perdition.example.com 143