ID CVE-2005-3690
Summary Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands.
References
Vulnerable Configurations
  • cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
    cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 15492
confirm http://www.mailenable.com/hotfix/
fulldisc 20051118 Secunia Research: MailEnable Buffer Overflow and Directory Traversal Vulnerabilities
misc http://secunia.com/secunia_research/2005-59/advisory/
osvdb 20929
sectrack 1015239
secunia 17633
vupen ADV-2005-2484
xf mailenable-imap-mailbox-bo(23110)
saint via4
bid 15492
description MailEnable IMAP mailbox name buffer overflow
id mail_imap_mailenable,mail_imap_mailenableent
osvdb 20929
title mailenable_imap_mailbox
type remote
Last major update 11-07-2017 - 01:33
Published 19-11-2005 - 01:03
Last modified 11-07-2017 - 01:33
Back to Top