Multiple vulnerabilities have been reported in SLmail, which can be exploited by malicious people to execute arbitrary code on a vulnerable system with SYSTEM privileges.
1) Two boundary errors exist in "slmail.exe" when handling input supplied to the commands "ETRN" and "XTRN". A malicious person can exploit this by supplying a long, specially crafted argument to one of the vulnerable commands, which causes a buffer overflow.
2) A boundary error exists in POPPASSWD, which can be exploited by connecting to port 106/tcp and supplying an overly long, specially crafted string.
3) A boundary error also exists in the POP3 service, which can be exploited to cause a stack-based buffer overflow by supplying an overly long, specially crafted password (about 2600 bytes) when attempting to log in.
The vulnerabilities have been reported in version 22.214.171.12420 and 126.96.36.1992 on Windows. Other versions may also be affected.
NOTE: The third vulnerability has also been confirmed in the latest 5.5 trial version (188.8.131.5233), as it for some reason includes an old version of "SLmail.exe" (version 184.108.40.2062 compiled in February 2003). Other 5.5 versions may therefore also be affected.
Solution: The first two vulnerabilities have reportedly been fixed in version 5.5:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com