MailEnable IMAP EXAMINE Command Remote Overflow

High Nessus Plugin ID 20322


It is possible to execute code on the remote IMAP server.


The remote host is running a version of MailEnable's IMAP service that is prone to a buffer overflow attack when processing a EXAMINE command with a long mailbox name. Once authenticated, an attacker can exploit this flaw to execute arbitrary code subject to the privileges of the affected application. There are also reportedly similar issues with other IMAP commands.


Install Hotfix ME-10010 for MailEnable Professional 1.71 and earlier or MailEnable Enterprise Edition 1.1 and earlier.

See Also

Plugin Details

Severity: High

ID: 20322

File Name: mailenable_imap_examine_overflow.nasl

Version: $Revision: 1.18 $

Type: remote

Agent: windows

Family: Windows

Published: 2005/12/20

Modified: 2012/01/27

Dependencies: 12288, 17975

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Excluded KB Items: imap/false_imap

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2005/12/20

Reference Information

CVE: CVE-2005-4456

BID: 15985

OSVDB: 22007