MailEnable IMAP Server Multiple Buffer Overflow Vulnerabilities (ME-10021)

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is affected by multiple buffer overflow
vulnerabilities.

Description :

The IMAP server bundled with the version of MailEnable installed on the
remote host reportedly fails to handle malicious arguments to the
'EXAMINE', 'SELECT', and 'DELETE' commands. An authenticated, remote
attacker may be able to exploit these issues to crash the affected
service or to execute arbitrary code with LOCAL SYSTEM privileges.

See also :

http://secunia.com/secunia_research/2006-71/advisory/
http://seclists.org/fulldisclosure/2006/Nov/533
http://www.mailenable.com/hotfix/

Solution :

Apply Hotfix ME-10021.

Note that ME-10020 was initially listed as a solution, but it turns out
to be only a partial fix. Affected users should apply ME-10021 to fully
address the issue.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 23756 (mailenable_me_10021.nasl)

Bugtraq ID: 21362

CVE ID: CVE-2006-6290
CVE-2006-6291

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now