This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote mail server is affected by multiple issues.
The remote host is running a version of MailEnable Professional or
MailEnable Enterprise Edition that is prone to the following
- An IMAP Authenticate Request Buffer Overflow Vulnerability
Sending an AUTHENTICATE or LOGIN command with an argument
of 1016 characters or more overflows a stack-based buffer.
An attacker can leverage this flaw to overwrite sensitive
program control variables and thereby control execution
flow of the server process.
- An SMTP Malformed EHLO Request Denial Of Service Vulnerability
The SMTP service does not properly handle malformed EHLO
commands and may crash when it encounters an argument
containing the character 0x99. A remote attacker could use
this flaw to crash the SMTP service, thereby denying service
to legitimate users.
See also :
Apply the IMAP and SMTP hotfix from 4th April 2005. Note that the
hotfix does not fix the overflow involving an oversize LOGIN command.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true