MailEnable Standard SMTP mailto: Request Format String

This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.


Synopsis :

The remote SMTP server is afflicted by a format string vulnerability.

Description :

The remote host is running a version of MailEnable Standard Edition
that suffers from a format string vulnerability in its handling of
SMTP commands. Specifically, a remote attacker can crash the SMTP
daemon by sending a command with a format specifier as an argument.
Due to the nature of the flaw, it is likely that an attacker can also
be able to gain control of program execution and inject arbitrary
code.

See also :

http://www.securityfocus.com/archive/1/393566

Solution :

Apply the SMTP fix from 18th March 2005 located at
http://www.mailenable.com/hotfix/

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.8
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: SMTP problems

Nessus Plugin ID: 17364 (mailenable_smtp_cmd_format_strings.nasl)

Bugtraq ID: 12833

CVE ID: CVE-2005-0804