📄 2121.txt
字号:
Rule:--Sid:2121--Summary:This event is generated when a remote user uses a negative argument in the DELE command sent to port 110 on an internal server. This may indicate an attempt to exploit a boundary checking vulnerability in the POP DELE command in the Alt-N MDaemon mail server.--Impact:The service will crash when it attempts to process the command. The attacker must have a valid POP account on the mail server to attempt this exploit.--Detailed Information:This event may indicate an attempt to exploit a boundary checking vulnerability in the DELE command on the Alt-N MDaemon POP server. If an authenticated user sends the DELE command with a negative argument to the POP server, the MDaemon service will crash when it attempts to process the command. Note that this exploit can only be attempted by an authenticated user with a valid IMAP account on the server.--Affected Systems:Any operating system that runs the following IMAP servers: -Alt-N MDaemon 6.0.0 -Alt-N MDaemon 6.0.5 -Alt-N MDaemon 6.0.6 -Alt-N MDaemon 6.0.7--Attack Scenarios:An authenticated user can send a DELE -1 command to the POP server, which will cause the service to crash.--Ease of Attack:Simple. Exploits and proof of concept exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to Alt-N MDaemon 6.5.0 or later.Check the host for signs of compromise.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Sourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:Bugtraqhttp://www.securityfocus.com/bid/7445http://www.securityfocus.com/bid/6053--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -