Vulnerability Details : CVE-2004-1211
Public exploit exists!
Multiple buffer overflows in the IMAP service in Mercury/32 4.01a allow remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via long arguments to the (1) EXAMINE, (2) SUBSCRIBE, (3) STATUS, (4) APPEND, (5) CHECK, (6) CLOSE, (7) EXPUNGE, (8) FETCH, (9) RENAME, (10) DELETE, (11) LIST, (12) SEARCH, (13) CREATE, or (14) UNSUBSCRIBE commands.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2004-1211
Probability of exploitation activity in the next 30 days: 96.37%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2004-1211
-
Mercury/32 v4.01a IMAP RENAME Buffer Overflow
Disclosure Date: 2004-11-29First seen: 2020-04-26exploit/windows/imap/mercury_renameThis module exploits a stack buffer overflow vulnerability in the Mercury/32 v.4.01a IMAP service. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2004-1211
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2004-1211
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2004-1211
-
http://www.securityfocus.com/bid/11775
Mercury Mail Multiple Remote IMAP Stack Buffer Overflow VulnerabilitiesExploit;Patch;Vendor Advisory
- http://home.kabelfoon.nl/~jaabogae/han/m_401b.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/18318
-
http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/029701.html
-
http://marc.info/?l=bugtraq&m=110193702909991&w=2
Products affected by CVE-2004-1211
- cpe:2.3:a:david_harris:mercury:4.0.1a:*:win32:*:*:*:*:*