Active MailServer has been reported prone to a remotely exploitable buffer overflow vulnerability. The issue presents itself, likely due to insufficient bounds checking performed when copying user-supplied data into an internal memory buffer. Excessive data supplied as an argument to various SMTP commands, will result in an exception in the Active MailServer executable. The server will fail after this exception and will need to be restarted to resume normal functionality. A remote attacker may exploit this condition to trigger a persistent denial of service condition in the affected server. Although unconfirmed due to the nature of this vulnerability it may be exploitable to execute arbitrary code.
Active MailServer has been reported prone to a remotely exploitable buffer overflow vulnerability. The issue presents itself, likely due to insufficient bounds checking performed when copying user-supplied data into an internal memory buffer. Excessive data supplied as an argument to various SMTP commands, will result in an exception in the Active MailServer executable. The server will fail after this exception and will need to be restarted to resume normal functionality. A remote attacker may exploit this condition to trigger a persistent denial of service condition in the affected server. Although unconfirmed due to the nature of this vulnerability it may be exploitable to execute arbitrary code.