ID CVE-2006-6605
Summary Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
References
Vulnerable Configurations
  • cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 17-10-2018 - 21:49)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 21645
bugtraq 20061218 Secunia Research: MailEnable POP Service "PASS" Command BufferOverflow
confirm http://www.mailenable.com/hotfix/
misc http://secunia.com/secunia_research/2006-75/advisory/
sectrack 1017395
secunia 23127
sreason 2053
vupen ADV-2006-5052
saint via4
bid 21645
description MailEnable POP PASS command buffer overflow
id mail_pop_mailenable,mail_pop_mailenablepro,mail_pop_mailenableent,mail_pop_mailenablepassbo
osvdb 32341
title mailenable_pop_pass
type remote
Last major update 17-10-2018 - 21:49
Published 19-12-2006 - 19:28
Last modified 17-10-2018 - 21:49
Back to Top