Lucene search

K
saintSAINT CorporationSAINT:F8FCB083E3319817669B4A63DACAA082
HistoryDec 01, 2006 - 12:00 a.m.

MailEnable IMAP SELECT buffer overflow

2006-12-0100:00:00
SAINT Corporation
my.saintcorporation.com
14

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.5%

Added: 12/01/2006
CVE: CVE-2006-6290
BID: 21362
OSVDB: 31698

Background

MailEnable is a mail server supporting SMTP and POP3 for Windows platforms. MailEnable Professional and MailEnable Enterprise also include IMAP and HTTPMail services.

Problem

A buffer overflow vulnerability in the IMAP service allows an authenticated attacker to execute arbitrary commands by sending a specially crafted SELECT command.

Resolution

Apply the latest hotfix for IMAP.

References

<http://secunia.com/advisories/23080&gt;

Limitations

Exploit works on MailEnable Professional 2.32 with Patch ME-10018 and requires a valid IMAP login name, password, and post office name.

Platforms

Windows

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.5%

Related for SAINT:F8FCB083E3319817669B4A63DACAA082