MailEnable SMTP Server HELO Command Remote DoS

Medium Nessus Plugin ID 21771

Synopsis

The remote SMTP server is susceptible to a denial of service attack.

Description

The remote host is running MailEnable, a commercial mail server for Windows.

According to the version number in its banner, the SMTP server bundled with the installation of MailEnable on the remote host will crash when handling malformed HELO commands. An unauthenticated attacker may be able to leverage this issue to deny service to legitimate users.

Solution

Apply the ME-10013 hotfix.

See Also

http://www.divisionbyzero.be/?p=173

https://www.securityfocus.com/archive/1/438374/30/0/threaded

http://www.divisionbyzero.be/?p=174

https://seclists.org/fulldisclosure/2006/Jun/810

http://www.mailenable.com/hotfix/

Plugin Details

Severity: Medium

ID: 21771

File Name: mailenable_smtp_helo_dos.nasl

Version: 1.19

Type: remote

Published: 2006/06/28

Updated: 2018/11/15

Dependencies: 10263

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/06/24

Reference Information

CVE: CVE-2006-3277

BID: 18630