MailEnable IMAP / SMTP Multiple Remote Vulnerabilities

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote mail server is affected by multiple issues.

Description :

The remote host is running a version of MailEnable Professional or
MailEnable Enterprise Edition that is prone to the following
vulnerabilities :

- An IMAP Authenticate Request Buffer Overflow Vulnerability
Sending an AUTHENTICATE or LOGIN command with an argument
of 1016 characters or more overflows a stack-based buffer.
An attacker can leverage this flaw to overwrite sensitive
program control variables and thereby control execution
flow of the server process.

- An SMTP Malformed EHLO Request Denial Of Service Vulnerability
The SMTP service does not properly handle malformed EHLO
commands and may crash when it encounters an argument
containing the character 0x99. A remote attacker could use
this flaw to crash the SMTP service, thereby denying service
to legitimate users.

See also :

http://seclists.org/bugtraq/2005/Apr/76
http://seclists.org/fulldisclosure/2005/Apr/104
http://www.mailenable.com/hotfix/

Solution :

Apply the IMAP and SMTP hotfix from 4th April 2005. Note that the
hotfix does not fix the overflow involving an oversize LOGIN command.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 17974 (mailenable_smtp_and_imap_vulns.nasl)

Bugtraq ID: 12994
12995
13040

CVE ID: CVE-2005-1013
CVE-2005-1014
CVE-2005-1015

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now