MailEnable POP Server PASS Command Remote Overflow (ME-10026)

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote POP server is affected by a buffer overflow.

Description :

The POP server bundled with the version of MailEnable installed on the
remote host reportedly is affected by a buffer overflow involving the
'PASS' command. An unauthenticated, remote attacker may be able to
exploit this issue to crash the service service or to execute
arbitrary code with LOCAL SYSTEM privileges.

See also :

http://secunia.com/secunia_research/2006-75/advisory/
http://seclists.org/fulldisclosure/2006/Dec/334
http://www.mailenable.com/hotfix/

Solution :

Apply Hotfix ME-10026.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 23924 (mailenable_me_10026.nasl)

Bugtraq ID: 21645

CVE ID: CVE-2006-6605

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now