MailEnable IMAP Server Multiple Buffer Overflow Vulnerabilities (ME-10021)

medium Nessus Plugin ID 23756

Synopsis

The remote IMAP server is affected by multiple buffer overflow vulnerabilities.

Description

The IMAP server bundled with the version of MailEnable installed on the remote host reportedly fails to handle malicious arguments to the 'EXAMINE', 'SELECT', and 'DELETE' commands. An authenticated, remote attacker may be able to exploit these issues to crash the affected service or to execute arbitrary code with LOCAL SYSTEM privileges.

Solution

Apply Hotfix ME-10021.

Note that ME-10020 was initially listed as a solution, but it turns out to be only a partial fix. Affected users should apply ME-10021 to fully address the issue.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2006-71/advisory/

https://seclists.org/fulldisclosure/2006/Nov/533

http://www.mailenable.com/hotfix/

Plugin Details

Severity: Medium

ID: 23756

File Name: mailenable_me_10021.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 12/4/2006

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: SMB/MailEnable/Installed

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 11/23/2006

Reference Information

CVE: CVE-2006-6290, CVE-2006-6291

BID: 21362

Secunia: 23080