MailEnable Standard SMTP mailto: Request Format String

This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.

Synopsis :

The remote SMTP server is afflicted by a format string vulnerability.

Description :

The remote host is running a version of MailEnable Standard Edition
that suffers from a format string vulnerability in its handling of
SMTP commands. Specifically, a remote attacker can crash the SMTP
daemon by sending a command with a format specifier as an argument.
Due to the nature of the flaw, it is likely that an attacker can also
be able to gain control of program execution and inject arbitrary

See also :

Solution :

Apply the SMTP fix from 18th March 2005 located at

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.8
Public Exploit Available : true

Family: SMTP problems

Nessus Plugin ID: 17364 (mailenable_smtp_cmd_format_strings.nasl)

Bugtraq ID: 12833

CVE ID: CVE-2005-0804

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now