MailEnable IMAP Server W3C Logging Overflow

This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is prone to a buffer overflow attack.

Description :

The remote host is running a version of MailEnable's IMAP service
that is prone to a buffer overflow attack involving its handling of
W3C logging. An attacker may be able to exploit this to execute
arbitrary code subject to the privileges of the affected application,
typically Administrator.

See also :

http://forum.mailenable.com/viewtopic.php?t=8555
http://www.mailenable.com/hotfix/

Solution :

Apply the 3 October 2005 IMAP Rollup Critical Update/Performance
Improvement Hotfix referenced in the vendor advisory above.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 19783 (mailenable_imap_logging_overflow.nasl)

Bugtraq ID: 15006

CVE ID: CVE-2005-3155

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now