This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The remote SMTP server is afflicted by a format string vulnerability.
The remote host is running a version of MailEnable Standard Edition
that suffers from a format string vulnerability in its handling of
SMTP commands. Specifically, a remote attacker can crash the SMTP
daemon by sending a command with a format specifier as an argument.
Due to the nature of the flaw, it is likely that an attacker can also
be able to gain control of program execution and inject arbitrary
See also :
Apply the SMTP fix from 18th March 2005 located at
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.8
Public Exploit Available : true
Family: SMTP problems
Nessus Plugin ID: 17364 (mailenable_smtp_cmd_format_strings.nasl)
Bugtraq ID: 12833
CVE ID: CVE-2005-0804
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.