MailEnable POP Server PASS Command Remote Overflow (ME-10026)

critical Nessus Plugin ID 23924

Synopsis

The remote POP server is affected by a buffer overflow.

Description

The POP server bundled with the version of MailEnable installed on the remote host reportedly is affected by a buffer overflow involving the 'PASS' command. An unauthenticated, remote attacker may be able to exploit this issue to crash the service service or to execute arbitrary code with LOCAL SYSTEM privileges.

Solution

Apply Hotfix ME-10026.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2006-75/advisory/

https://seclists.org/fulldisclosure/2006/Dec/334

http://www.mailenable.com/hotfix/

Plugin Details

Severity: Critical

ID: 23924

File Name: mailenable_me_10026.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 12/19/2006

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: SMB/MailEnable/Installed

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/18/2006

Reference Information

CVE: CVE-2006-6605

BID: 21645