{"vuid":"VU#819630","idnumber":"819630","name":"NJStar Communicator MiniSmtp packet processing buffer overflow vulnerability","keywords":["NJStar Communicator","minismtp"],"overview":"NJStar Communicator MiniSmtp server contains a buffer overflow vulnerability when processing malicious packets.","clean_desc":"According to the NJStar's website, \"NJStar Communicator enables Chinese, Japanese and Korean (CJK) language input, display, print and conversions on your English or other western Windows.\" NJStar Communicator contains a MiniSmtp server which listens on tcp/25. This MiniSmtp server contains a vulnerability caused by a boundary error when processing malicious packets. Note this server is not enabled by default. NJStar Communicator MiniSmtp version 3.0.11818 is reported to be affected. Other versions may also be affected. Exploit code has been released publicly.","impact":"An attacker with network access to the NJStar Communicator MiniSmtp server could access the system with administrative privileges and potentially compromise the underlying host.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Restrict access Restrict access to the NJStar Communicator MiniSmtp server to trusted users and networks.","sysaffected":"","thanks":"This vulnerability was discovered by Dillon Beresford.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","n","j","s","t","a","r",".","c","o","m","/","c","m","s","/","n","j","s","t","a","r","-","c","o","m","m","u","n","i","c","a","t","o","r"],"cveids":["CVE-2011-4040"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-10-31T12:48:25Z","publicdate":"2011-10-31T00:00:00Z","datefirstpublished":"2011-11-02T02:15:36Z","dateupdated":"2011-11-09T13:13:37Z","revision":11,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"7","cam_impact":"19","cam_easeofexploitation":"19","cam_attackeraccessrequired":"20","cam_scorecurrent":"20.84775","cam_scorecurrentwidelyknown":"25.585875","cam_scorecurrentwidelyknownexploited":"44.538375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":20.84775,"vulnote":null}