Lucene search

K
saintSAINT CorporationSAINT:C432F6DF0A5A34E0B5491C3266B47ED6
HistoryDec 01, 2006 - 12:00 a.m.

MailEnable IMAP SELECT buffer overflow

2006-12-0100:00:00
SAINT Corporation
www.saintcorporation.com
10

0.011 Low

EPSS

Percentile

84.5%

Added: 12/01/2006
CVE: CVE-2006-6290
BID: 21362
OSVDB: 31698

Background

MailEnable is a mail server supporting SMTP and POP3 for Windows platforms. MailEnable Professional and MailEnable Enterprise also include IMAP and HTTPMail services.

Problem

A buffer overflow vulnerability in the IMAP service allows an authenticated attacker to execute arbitrary commands by sending a specially crafted SELECT command.

Resolution

Apply the latest hotfix for IMAP.

References

<http://secunia.com/advisories/23080&gt;

Limitations

Exploit works on MailEnable Professional 2.32 with Patch ME-10018 and requires a valid IMAP login name, password, and post office name.

Platforms

Windows

0.011 Low

EPSS

Percentile

84.5%

Related for SAINT:C432F6DF0A5A34E0B5491C3266B47ED6