Lucene search

K
saintSAINT CorporationSAINT:8759DF05EE60C36C728AB69DBEBBFA9D
HistoryDec 03, 2005 - 12:00 a.m.

MailEnable IMAP W3C Logging Buffer Overflow

2005-12-0300:00:00
SAINT Corporation
download.saintcorporation.com
6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.779 High

EPSS

Percentile

98.3%

Added: 12/03/2005
CVE: CVE-2005-3155
BID: 15006
OSVDB: 19842

Background

MailEnable is a mail server for Windows platforms. The standard edition supports the SMTP and POP3 protocols. MailEnable Professional and MailEnable Enterprise also support IMAP and HTTPMail.

Problem

MailEnable’s IMAP service is affected by a buffer overflow condition in the handling of W3C logging. This could allow authenticated users to execute arbitrary commands.

Resolution

Upgrade to MailEnable Professional 1.7 or MailEnable Enterprise 1.1 with all needed hotfixes.

References

<http://secunia.com/advisories/17010&gt;

Limitations

Exploit works on MailEnable Professional 1.6. A valid IMAP user name and password are required.

Platforms

Windows 2000 / Windows XP
Windows Server 2003

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.779 High

EPSS

Percentile

98.3%

Related for SAINT:8759DF05EE60C36C728AB69DBEBBFA9D