Vulnerability Name:

CVE-2006-4364 (CCN-28517)

Assigned:2006-08-21
Published:2006-08-21
Updated:2018-10-17
Summary:Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.8 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-4364

Source: CCN
Type: MDaemon Server v9.X Release Notes
MDaemon 9.06 - August 1, 2006

Source: CONFIRM
Type: UNKNOWN
http://files.altn.com/MDaemon/Release/RelNotes_en.txt

Source: CCN
Type: SA21595
MDaemon POP3 Server Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
21595

Source: SREASON
Type: UNKNOWN
1446

Source: CCN
Type: SECTRACK ID: 1016729
MDaemon Buffer Overflow in USER and APOP Commands Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016729

Source: CCN
Type: Alt-N Technologies Web site
Download - MDaemon

Source: CCN
Type: INFIGO IS Security Advisory #INFIGO-2006-08-04
MDaemon POP3 server remote buffer overflow (preauth)

Source: MISC
Type: Exploit
http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04

Source: OSVDB
Type: UNKNOWN
28125

Source: CCN
Type: OSVDB ID: 28125
MDaemon POP3 Server USER / APOP Command Remote Overflow

Source: BUGTRAQ
Type: UNKNOWN
20060822 MDaemon POP3 server remote buffer overflow (preauth)

Source: BID
Type: Exploit
19651

Source: CCN
Type: BID-19651
Alt-N MDaemon Multiple Remote Pre-Authentication POP3 Buffer Overflow Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2006-3361

Source: XF
Type: UNKNOWN
mdaemon-pop3-bo(28517)

Source: XF
Type: UNKNOWN
mdaemon-pop3-bo(28517)

Source: EXPLOIT-DB
Type: UNKNOWN
2245

Vulnerable Configuration:Configuration 1:
  • cpe:/a:alt-n:mdaemon:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:5.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.7.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.7.9:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:6.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    alt-n mdaemon 2.8
    alt-n mdaemon 2.8.5.0
    alt-n mdaemon 2.71_sp1
    alt-n mdaemon 3.0.3
    alt-n mdaemon 3.0.4
    alt-n mdaemon 3.1.1
    alt-n mdaemon 3.1.2
    alt-n mdaemon 3.1_beta
    alt-n mdaemon 3.5.0
    alt-n mdaemon 3.5.1
    alt-n mdaemon 3.5.4
    alt-n mdaemon 3.5.4
    alt-n mdaemon 3.5.4
    alt-n mdaemon 3.5.6
    alt-n mdaemon 5.0
    alt-n mdaemon 5.0
    alt-n mdaemon 5.0.1
    alt-n mdaemon 5.0.2
    alt-n mdaemon 5.0.3
    alt-n mdaemon 5.0.4
    alt-n mdaemon 5.0.5
    alt-n mdaemon 5.0.6
    alt-n mdaemon 5.0.7
    alt-n mdaemon 6.0
    alt-n mdaemon 6.0.5
    alt-n mdaemon 6.0.6
    alt-n mdaemon 6.0.7
    alt-n mdaemon 6.5.0
    alt-n mdaemon 6.5.1
    alt-n mdaemon 6.5.2
    alt-n mdaemon 6.7.5
    alt-n mdaemon 6.7.9
    alt-n mdaemon 6.8.0
    alt-n mdaemon 6.8.1
    alt-n mdaemon 6.8.2
    alt-n mdaemon 6.8.3
    alt-n mdaemon 6.8.4
    alt-n mdaemon 6.8.5
    alt-n mdaemon 7.2
    alt-n mdaemon 8.1.1
    alt-n mdaemon 8.1.3
    alt-n mdaemon 8.1.4
    alt-n mdaemon 9.0.1
    alt-n mdaemon 9.0.2
    alt-n mdaemon 9.0.3
    alt-n mdaemon 9.0.4
    alt-n mdaemon 9.0.5