MailEnable IMAP Server W3C Logging Overflow

High Nessus Plugin ID 19783


The remote IMAP server is prone to a buffer overflow attack.


The remote host is running a version of MailEnable's IMAP service that is prone to a buffer overflow attack involving its handling of W3C logging. An attacker may be able to exploit this to execute arbitrary code subject to the privileges of the affected application, typically Administrator.


Apply the 3 October 2005 IMAP Rollup Critical Update/Performance Improvement Hotfix referenced in the vendor advisory above.

See Also

Plugin Details

Severity: High

ID: 19783

File Name: mailenable_imap_logging_overflow.nasl

Version: $Revision: 1.17 $

Type: remote

Agent: windows

Family: Windows

Published: 2005/10/04

Modified: 2011/04/20

Dependencies: 11414, 10263

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Excluded KB Items: imap/false_imap

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/10/03

Exploitable With

Metasploit (MailEnable IMAPD W3C Logging Buffer Overflow)

Reference Information

CVE: CVE-2005-3155

BID: 15006

OSVDB: 19842