Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dmail | Netwin | 2.5d (including) | 2.5d (including) |
Dmail | Netwin | 2.7 (including) | 2.7 (including) |
Dmail | Netwin | 2.7q (including) | 2.7q (including) |
Dmail | Netwin | 2.7r (including) | 2.7r (including) |
Dmail | Netwin | 2.8e (including) | 2.8e (including) |
Dmail | Netwin | 2.8f (including) | 2.8f (including) |
Dmail | Netwin | 2.8g (including) | 2.8g (including) |
Dmail | Netwin | 2.8h (including) | 2.8h (including) |
Dmail | Netwin | 2.8i (including) | 2.8i (including) |
Surgeftp | Netwin | 1.0b (including) | 1.0b (including) |
Surgeftp | Netwin | 2.0a (including) | 2.0a (including) |
Surgeftp | Netwin | 2.0b (including) | 2.0b (including) |