Lucene search

K
saintSAINT CorporationSAINT:9C900D941DCC3E0093856537D1110432
HistoryNov 29, 2005 - 12:00 a.m.

MailEnable IMAP STATUS buffer overflow

2005-11-2900:00:00
SAINT Corporation
my.saintcorporation.com
16

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.923 High

EPSS

Percentile

99.0%

Added: 11/29/2005
CVE: CVE-2005-2278
BID: 14243
OSVDB: 17844

Background

MailEnable is a mail server for Windows platforms. The standard edition supports the SMTP and POP3 protocols. MailEnable Professional and MailEnable Enterprise also support IMAP and HTTPMail.

Problem

A buffer overflow in the STATUS command could allow an authenticated user to execute arbitrary commands.

Resolution

Upgrade to MailEnable Professional 1.6 or MailEnable Enterprise 1.1 with all needed hotfixes.

References

[http://marc.theaimsgroup.com/?l=bugtraq&amp;m=112127188609993&amp;w=2 ](<http://marc.theaimsgroup.com/?l=bugtraq&m=112127188609993&w=2
>)

Limitations

Requires a valid IMAP user and password.

Platforms

Windows 2000
Windows XP

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.923 High

EPSS

Percentile

99.0%