MailEnable IMAP / SMTP Multiple Remote Vulnerabilities

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.

Synopsis :

The remote mail server is affected by multiple issues.

Description :

The remote host is running a version of MailEnable Professional or
MailEnable Enterprise Edition that is prone to the following
vulnerabilities :

- An IMAP Authenticate Request Buffer Overflow Vulnerability
Sending an AUTHENTICATE or LOGIN command with an argument
of 1016 characters or more overflows a stack-based buffer.
An attacker can leverage this flaw to overwrite sensitive
program control variables and thereby control execution
flow of the server process.

- An SMTP Malformed EHLO Request Denial Of Service Vulnerability
The SMTP service does not properly handle malformed EHLO
commands and may crash when it encounters an argument
containing the character 0x99. A remote attacker could use
this flaw to crash the SMTP service, thereby denying service
to legitimate users.

See also :

Solution :

Apply the IMAP and SMTP hotfix from 4th April 2005. Note that the
hotfix does not fix the overflow involving an oversize LOGIN command.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 17974 (mailenable_smtp_and_imap_vulns.nasl)

Bugtraq ID: 12994

CVE ID: CVE-2005-1013

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now