MailEnable SMTP Service Denial of Service Vulnerabilities (ME-10044)

medium Nessus Plugin ID 49284

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote mail server is prone to denial of service attacks.

Description

The SMTP service (MESMTPC.exe) included with the version of MailEnable on the remote host reportedly does not properly check the length of either the email address used in a 'MAIL FROM' command or the domain name in a 'RCPT TO' command before using it in a log message.

A malicious attacker may be able to leverage these issues to trigger an unhandled invalid parameter error and cause the affected SMTP service to crash.

Solution

Either apply Hotfix ME-10044 or upgrade to MailEnable 4.26 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2010-112/

http://www.mailenable.com/hotfix/

http://www.mailenable.com/Standard-ReleaseNotes.txt

http://www.mailenable.com/Professional-ReleaseNotes.txt

http://www.mailenable.com/Enterprise-ReleaseNotes.txt

Plugin Details

Severity: Medium

ID: 49284

File Name: mailenable_me_10044.nasl

Version: 1.7

Type: local

Published: 9/20/2010

Updated: 11/15/2018

Dependencies: mailenable_detect.nasl, smb_enum_services.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: SMB/MailEnable/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 9/13/2010

Vulnerability Publication Date: 9/13/2010

Reference Information

CVE: CVE-2010-2580

BID: 43182