MailEnable SMTP Service Denial of Service Vulnerabilities (ME-10044)

Medium Nessus Plugin ID 49284

Synopsis

The remote mail server is prone to denial of service attacks.

Description

The SMTP service (MESMTPC.exe) included with the version of MailEnable on the remote host reportedly does not properly check the length of either the email address used in a 'MAIL FROM' command or the domain name in a 'RCPT TO' command before using it in a log message.

A malicious attacker may be able to leverage these issues to trigger an unhandled invalid parameter error and cause the affected SMTP service to crash.

Solution

Either apply Hotfix ME-10044 or upgrade to MailEnable 4.26 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2010-112/

http://www.mailenable.com/hotfix/

http://www.mailenable.com/Standard-ReleaseNotes.txt

http://www.mailenable.com/Professional-ReleaseNotes.txt

http://www.mailenable.com/Enterprise-ReleaseNotes.txt

Plugin Details

Severity: Medium

ID: 49284

File Name: mailenable_me_10044.nasl

Version: 1.7

Type: local

Published: 2010/09/20

Updated: 2018/11/15

Dependencies: 10456, 23753

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: SMB/MailEnable/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/09/13

Vulnerability Publication Date: 2010/09/13

Reference Information

CVE: CVE-2010-2580

BID: 43182