Mercur v5.0 IMAP server is prone to a remotely exploitable stack-based buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer. Credit to Tim Taylor for discover the vulnerability.
c2b10d51d7fe81041b5773f98702a25cb43650d4819457d1ebaa769257273fc3
This Metasploit module exploits a stack overflow in Atrium Mercur IMAP 5.0 SP3. Since the room for shellcode is small, using the reverse ordinal payloads yields the best results.
bcc9986727d1a31fd19c6ec9efeca29335e3bac2e984bdb32e707abede16b9c6