Vulnerability Name: | CVE-2003-1200 (CCN-14097) | ||||||||
Assigned: | 2003-12-29 | ||||||||
Published: | 2003-12-29 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Stack-based buffer overflow in FORM2RAW.exe in Alt-N MDaemon 6.5.2 through 6.8.5 allows remote attackers to execute arbitrary code via a long From parameter to Form2Raw.cgi. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Dec 29 2003 - 13:57:21 CST Remote buffer overflow in Mdaemon Raw message Handler Source: MITRE Type: CNA CVE-2003-1200 Source: MISC Type: UNKNOWN http://hat-squad.com/bugreport/mdaemon-raw.txt Source: BUGTRAQ Type: UNKNOWN 20040314 Rosiello Security's exploit for MDaemon Source: CCN Type: SA10512 MDaemon Raw Message Handler Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 10512 Source: CCN Type: Alt-N Technologies Web site Mdaemon Source: OSVDB Type: Exploit, Vendor Advisory 3255 Source: CCN Type: OSVDB ID: 3255 MDaemon Form2Raw CGI From Parameter Overflow Source: CCN Type: SecuriTeam Mailing List, Secuirty Holes & Exploits 16 Mar 2004 Remote Buffer Overflow in MDaemon (Exploit) Source: BUGTRAQ Type: Exploit, Vendor Advisory 20031229 [Hat-Squad] Remote buffer overflow in Mdaemon Raw message Handler Source: BID Type: Exploit, Vendor Advisory 9317 Source: CCN Type: BID-9317 Alt-N MDaemon/WorldClient Form2Raw Raw Message Handler Buffer Overflow Vulnerability Source: XF Type: UNKNOWN mdaemon-form2raw-from-bo(14097) Source: XF Type: UNKNOWN mdaemon-form2raw-from-bo(14097) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |