MailEnable Standard SMTP mailto: Request Format String

Medium Nessus Plugin ID 17364

Synopsis

The remote SMTP server is afflicted by a format string vulnerability.

Description

The remote host is running a version of MailEnable Standard Edition that suffers from a format string vulnerability in its handling of SMTP commands. Specifically, a remote attacker can crash the SMTP daemon by sending a command with a format specifier as an argument. Due to the nature of the flaw, it is likely that an attacker can also be able to gain control of program execution and inject arbitrary code.

Solution

Apply the SMTP fix from 18th March 2005 located at http://www.mailenable.com/hotfix/

See Also

http://www.securityfocus.com/archive/1/393566

Plugin Details

Severity: Medium

ID: 17364

File Name: mailenable_smtp_cmd_format_strings.nasl

Version: $Revision: 1.16 $

Type: remote

Published: 2005/03/18

Modified: 2011/04/20

Dependencies: 10263

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/03/17

Reference Information

CVE: CVE-2005-0804

BID: 12833

OSVDB: 14858