COMMAND

    Seattle Lab Sendmail v2.5

SYSTEMS AFFECTED

    WinNT

PROBLEM

    David LeBlanc found following.  Version 2.5 (current version  when
    writing this) is vulnerable to a buffer overrun attack on the POP3
    service.  If the username  supplied is too long, the  service will
    fail  with  a  memory  exception.   There  are no current exploits
    which can  cause remote  execution, but  given the characteristics
    of the failure, it seems entirely possible that this could occur.

    At the very least, it constitutes a denial of service which will
    require rebooting the server if attacked.

SOLUTION

    Seattle Lab  reported that  the problem  has been  fixed in  v2.6,
    which should be available in beta form on 17th Oct 1997.

    The current shipping versions of both the UNIX and NT ISS Scanners
    are capable of causing these failures.