MailEnable IMAP Server (meimaps.exe) Crafted RENAME Command Remote DoS

This script is Copyright (C) 2005-2011 Josh Zlatin-Amishav


Synopsis :

The remote IMAP server is prone to denial of service attacks.

Description :

The remote host is running MailEnable, a commercial mail server for
Windows.

The IMAP server bundled with the version of MailEnable Professional or
Enterprise Edition installed on the remote host is prone to crash due
to incorrect handling of mailbox names in the rename command. An
authenticated, remote attacker can exploit this flaw to crash the IMAP
server on the remote host.

See also :

http://www.securityfocus.com/archive/1/417589
http://www.mailenable.com/hotfix/MEIMAPS.ZIP

Solution :

Apply the IMAP Cumulative Hotfix/Update provided in the zip file
referenced above.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVSS Temporal Score : 3.5
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 20245 (mailenable_imap_rename_dos.nasl)

Bugtraq ID: 15556

CVE ID: CVE-2005-3813

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now