qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests netqmail 1.06_4

Georgi Guninski writes:

There are several issues with qmail on 64 bit platforms - classical integer overflow, pointer with signed index and signedness problem (not counting the memory consumtion dos, which just helps).

Update: the problem with the signed index is exploitable on Freebsd 5.4 amd64 wih a lot of virtual memory.

The national vulnaribility database summarizes:

Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.

http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code-execution-qmail.txt CVE-2005-1513 CVE-2005-1514 CVE-2005-1515 2005-05-06 2005-05-11
qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests netqmail-tls 1.06.20160918_2

Georgi Guninski writes:

There are several issues with qmail on 64 bit platforms - classical integer overflow, pointer with signed index and signedness problem (not counting the memory consumtion dos, which just helps).

Update: the problem with the signed index is exploitable on Freebsd 5.4 amd64 wih a lot of virtual memory.

The national vulnaribility database summarizes:

Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.

http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code-execution-qmail.txt CVE-2005-1513 CVE-2005-1514 CVE-2005-1515 2005-05-06 2005-05-11
qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests netqmail-mysql 1.06.1.1.15_1

Georgi Guninski writes:

There are several issues with qmail on 64 bit platforms - classical integer overflow, pointer with signed index and signedness problem (not counting the memory consumtion dos, which just helps).

Update: the problem with the signed index is exploitable on Freebsd 5.4 amd64 wih a lot of virtual memory.

The national vulnaribility database summarizes:

Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.

http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code-execution-qmail.txt CVE-2005-1513 CVE-2005-1514 CVE-2005-1515 2005-05-06 2005-05-11