SMTP.RCPT.TO.Command.Buffer.Overflow

description-logoDescription

This indicates a possible exploit of a stack-based buffer-overflow vulnerability in GoodTech SMTP server.
GoodTech SMTP server provides Simple Mail Transfer Protocol (SMTP) services to any email client, running as a service on a host Windows machine. A stack-based buffer-overflow vulnerability is reported in it that may allow an attacker to execute arbitrary code on the host system. This is due to the application's failure to sanitize the RCPT TO field in received email messages. To exploit this an attacker may send specially crafted email messages to the server, with an overly long string as email address with the "RCPT TO" command. This causes a buffer overflow resulting in arbitrary code execution on the vulnerable system, with system level privileges, in the context of the affected application.

affected-products-logoAffected Products

GoodTech SMTP Server 5.16 and GoodTech SMTP Server 5.15.

Impact logoImpact

Compromise of the affected system. Attacker may execute arbitrary code on the system.

recomended-action-logoRecommended Actions

Upgrade to GoodTech SMTP Server 5.17 or later.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-02-06 15.773 Sig Added