MailEnable POP Server PASS Command Remote Overflow (ME-10026)

Critical Nessus Plugin ID 23924


The remote POP server is affected by a buffer overflow.


The POP server bundled with the version of MailEnable installed on the remote host reportedly is affected by a buffer overflow involving the 'PASS' command. An unauthenticated, remote attacker may be able to exploit this issue to crash the service service or to execute arbitrary code with LOCAL SYSTEM privileges.


Apply Hotfix ME-10026.

See Also

Plugin Details

Severity: Critical

ID: 23924

File Name: mailenable_me_10026.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2006/12/19

Modified: 2016/10/27

Dependencies: 23753

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: SMB/MailEnable/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2006/12/18

Reference Information

CVE: CVE-2006-6605

BID: 21645

OSVDB: 32341