MailEnable Professional HTTPMail GET Request Remote Overflow

medium Nessus Plugin ID 14656

Synopsis

The remote mail server is affected by a remote denial of service vulnerability.

Description

The target is running at least one instance of MailEnable that has a flaw in the HTTPMail service (MEHTTPS.exe) in the Professional and Enterprise Editions. The flaw can be exploited by issuing an HTTP request exceeding 4045 bytes (8500 if logging is disabled), which causes a heap-based buffer overflow, crashing the HTTPMail service and possibly allowing for arbitrary code execution.

Solution

Upgrade to MailEnable Professional / Enterprise 1.19 or later.

See Also

http://www.hat-squad.com/en/000071.html

Plugin Details

Severity: Medium

ID: 14656

File Name: mailenable_httpmail_get_overflow.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 9/3/2004

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/11/2004

Reference Information

CVE: CVE-2004-2727

BID: 10312

CWE: 119