MailEnable IMAP STATUS Command Remote Overflow

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is affected by a buffer overflow vulnerability.

Description :

The remote host is running a version of MailEnable's IMAP service
that is prone to a buffer overflow attack when processing a STATUS
command with a long mailbox name. Once authenticated, an attacker can
exploit this flaw to execute arbitrary code subject to the privileges
of the affected application.

See also :

http://www.coresecurity.com/common/showdoc.php?idx=467&idxseccion=10
http://seclists.org/bugtraq/2005/Jul/202

Solution :

Upgrade to MailEnable Professional 1.6 or later or to MailEnable
Enterprise Edition 1.1 or later.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 19193 (mailenable_imap_status_overflow.nasl)

Bugtraq ID: 14243

CVE ID: CVE-2005-2278

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now