CVE-2006-4364
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/08/2006
Last modified:
03/04/2025
Description
Multiple heap-based buffer overflows in the POP3 server in Alt-N Technologies MDaemon before 9.0.6 allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via long strings that contain '@' characters in the (1) USER and (2) APOP commands.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:alt-n:mdaemon:2.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:2.71_sp1:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.5.4:*:pro:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.5.4:*:standard:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:3.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://files.altn.com/MDaemon/Release/RelNotes_en.txt
- http://secunia.com/advisories/21595
- http://securityreason.com/securityalert/1446
- http://securitytracker.com/id?1016729=
- http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04
- http://www.osvdb.org/28125
- http://www.securityfocus.com/archive/1/444015/100/0/threaded
- http://www.securityfocus.com/bid/19651
- http://www.vupen.com/english/advisories/2006/3361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28517
- https://www.exploit-db.com/exploits/2245
- http://files.altn.com/MDaemon/Release/RelNotes_en.txt
- http://secunia.com/advisories/21595
- http://securityreason.com/securityalert/1446
- http://securitytracker.com/id?1016729=
- http://www.infigo.hr/en/in_focus/advisories/INFIGO-2006-08-04
- http://www.osvdb.org/28125
- http://www.securityfocus.com/archive/1/444015/100/0/threaded
- http://www.securityfocus.com/bid/19651
- http://www.vupen.com/english/advisories/2006/3361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28517
- https://www.exploit-db.com/exploits/2245