MailEnable SMTP Connector Multiple NTLM Authentication Vulnerabilities

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote SMTP server is affected by multiple vulnerabilities.

Description :

The remote host is running MailEnable, a commercial mail server for
Windows.

The version of MailEnable Professional or MailEnable Enterprise
installed on the remote host has several problems involving its
support of NTLM authentication. A remote, unauthenticated attacker
can leverage these flaws to execute arbitrary code on the remote host
or crash the SMTP connector.

Note that NTLM authentication is not enabled in MailEnable by default
but is on the remote host.

See also :

http://www.nessus.org/u?43b10751
http://archives.neohapsis.com/archives/fulldisclosure/2006-09/0561.html
http://www.mailenable.com/hotfix/

Solution :

Apply the ME-10015 hotfix referenced in the vendor link above.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: SMTP problems

Nessus Plugin ID: 22483 (mailenable_smtp_ntlm_flaws.nasl)

Bugtraq ID: 20290

CVE ID: CVE-2006-5176
CVE-2006-5177