var-200612-0711
Vulnerability from variot

Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command. MailEnable is a commercial POP3 and SMTP server. MailEnable has a vulnerability in handling user requests. MailEnable is prone to multiple buffer-overflow vulnerabilities in the IMAP service because the application fails to properly bounds-check various types of user-supplied data. This issues are reported to affect the following MailEnable versions, but other versions may also be vulnerable: 1.6-1.86 Professional Edition 1.1-1.40 Enterprise Edition 2.0-2.33 Professional Edition 2.0-2.33 Enterprise Edition.


To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German.

The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios.

This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links

Read the full description: http://corporate.secunia.com/products/48/?r=l

Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l


TITLE: MailEnable IMAP Service Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA23047

VERIFY ADVISORY: http://secunia.com/advisories/23047/

CRITICAL: Highly critical

IMPACT: DoS, System access

WHERE:

From remote

SOFTWARE: MailEnable Enterprise Edition 1.x http://secunia.com/product/4325/ MailEnable Enterprise Edition 2.x http://secunia.com/product/10427/ MailEnable Professional 2.x http://secunia.com/product/10625/ MailEnable Professional 1.x http://secunia.com/product/3474/

DESCRIPTION: A vulnerability has been reported in MailEnable IMAP service, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

Successful exploitation may allow execution of arbitrary code.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.mailenable.com/hotfix/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200612-0711",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "professional",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "2.0"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "2.33"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.6"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.82"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.29"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "2.01"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.28"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.30"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.27"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "2.0"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "2.03"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "2.08"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.26"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mailenable",
        "version": "1.25"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.2"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.07"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.27"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.30"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.16"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.24"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.16"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.06"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.2"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.17"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.22"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.25"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.18"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.29"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.14"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.21"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.21"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.28"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.24"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.19"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.12"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.33"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.09"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.18"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.15"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.32"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.11"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.15"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.14"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.13"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.17"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.23"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.19"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.26"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.1"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.22"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.1"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.04"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.31"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.23"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.11"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "1.12"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.05"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "mailenable",
        "version": "2.13"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mailenable",
        "version": "1.1 to  1.30"
      },
      {
        "model": "enterprise",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mailenable",
        "version": "and  2.0 to  2.33"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mailenable",
        "version": "1.6 to  1.82"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mailenable",
        "version": "and  2.0 to  2.33"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "no",
        "version": null
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "1.73"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "1.21"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.32"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.2"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "1.1"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.1"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.2"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.32"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "1.72"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.1"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "1.2"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.0"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "1.7"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mailenable",
        "version": "2.33"
      },
      {
        "model": "professional",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "2.35"
      },
      {
        "model": "enterprise edition",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "2.35"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "2.34"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "0"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "2.34"
      },
      {
        "model": "enterprise edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "1.40"
      },
      {
        "model": "professional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mailenable",
        "version": "1.83"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:mailenable:mailenable_enterprise",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:mailenable:mailenable_professional",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Secunia Research reported this vulnerability.",
    "sources": [
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2006-6290",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2006-6290",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2006-8650",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-6290",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2006-6290",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-8650",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200612-084",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command. MailEnable is a commercial POP3 and SMTP server. MailEnable has a vulnerability in handling user requests. MailEnable is prone to multiple buffer-overflow vulnerabilities in the IMAP service because the application fails to properly bounds-check various types of user-supplied data. \nThis issues are reported to affect the following MailEnable versions, but other versions may also be vulnerable:\n1.6-1.86 Professional Edition\n1.1-1.40 Enterprise Edition\n2.0-2.33 Professional Edition\n2.0-2.33 Enterprise Edition. \n\n----------------------------------------------------------------------\n\nTo improve our services to our customers, we have made a number of\nadditions to the Secunia Advisories and have started translating the\nadvisories to German. \n\nThe improvements will help our customers to get a better\nunderstanding of how we reached our conclusions, how it was rated,\nour thoughts on exploitation, attack vectors, and scenarios. \n\nThis includes:\n* Reason for rating\n* Extended description\n* Extended solution\n* Exploit code or links to exploit code\n* Deep links\n\nRead the full description:\nhttp://corporate.secunia.com/products/48/?r=l\n\nContact Secunia Sales for more information:\nhttp://corporate.secunia.com/how_to_buy/15/?r=l\n\n----------------------------------------------------------------------\n\nTITLE:\nMailEnable IMAP Service Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA23047\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/23047/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nMailEnable Enterprise Edition 1.x\nhttp://secunia.com/product/4325/\nMailEnable Enterprise Edition 2.x\nhttp://secunia.com/product/10427/\nMailEnable Professional 2.x\nhttp://secunia.com/product/10625/\nMailEnable Professional 1.x\nhttp://secunia.com/product/3474/\n\nDESCRIPTION:\nA vulnerability has been reported in MailEnable IMAP service, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or potentially compromise a vulnerable system. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.mailenable.com/hotfix/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "PACKETSTORM",
        "id": "52465"
      },
      {
        "db": "PACKETSTORM",
        "id": "52594"
      }
    ],
    "trust": 2.88
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-6290",
        "trust": 2.7
      },
      {
        "db": "SECUNIA",
        "id": "23047",
        "trust": 2.3
      },
      {
        "db": "SECUNIA",
        "id": "23080",
        "trust": 2.0
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-4778",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-4673",
        "trust": 1.6
      },
      {
        "db": "SECTRACK",
        "id": "1017276",
        "trust": 1.6
      },
      {
        "db": "SECTRACK",
        "id": "1017319",
        "trust": 1.6
      },
      {
        "db": "BID",
        "id": "21362",
        "trust": 1.3
      },
      {
        "db": "BID",
        "id": "21252",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20061130 SECUNIA RESEARCH: MAILENABLE IMAP SERVICE TWO VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "30614",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "52465",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "52594",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "db": "PACKETSTORM",
        "id": "52465"
      },
      {
        "db": "PACKETSTORM",
        "id": "52594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "id": "VAR-200612-0711",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:46:56.142000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Hot Fixes",
        "trust": 0.8,
        "url": "http://www.mailenable.com/hotfix/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.mailenable.com/hotfix/"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/secunia_research/2006-71/advisory/"
      },
      {
        "trust": 1.6,
        "url": "http://securitytracker.com/id?1017319"
      },
      {
        "trust": 1.6,
        "url": "http://securitytracker.com/id?1017276"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/23080"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/23047"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/4673"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/4778"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/453118/100/100/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/bid/21362"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30614"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6290"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-6290"
      },
      {
        "trust": 0.7,
        "url": "http://secunia.com/advisories/23047/"
      },
      {
        "trust": 0.6,
        "url": "http://www.mailenable.com/"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/4778"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/4673"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/453118/100/100/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/30614"
      },
      {
        "trust": 0.4,
        "url": "http://www.mailenable.com/hotfix/me-10020.zip"
      },
      {
        "trust": 0.4,
        "url": "http://secunia.com/advisories/23080/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/10427/"
      },
      {
        "trust": 0.2,
        "url": "http://corporate.secunia.com/products/48/?r=l"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/3474/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/4325/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://corporate.secunia.com/how_to_buy/15/?r=l"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/product/10625/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_research/2006-71/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "db": "PACKETSTORM",
        "id": "52465"
      },
      {
        "db": "PACKETSTORM",
        "id": "52594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "db": "PACKETSTORM",
        "id": "52465"
      },
      {
        "db": "PACKETSTORM",
        "id": "52594"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-11-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "date": "2006-11-23T00:00:00",
        "db": "BID",
        "id": "21252"
      },
      {
        "date": "2006-11-30T00:00:00",
        "db": "BID",
        "id": "21362"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "date": "2006-11-26T04:47:38",
        "db": "PACKETSTORM",
        "id": "52465"
      },
      {
        "date": "2006-11-30T16:12:25",
        "db": "PACKETSTORM",
        "id": "52594"
      },
      {
        "date": "2006-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "date": "2006-12-05T11:28:00",
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-01-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-8650"
      },
      {
        "date": "2007-02-16T17:47:00",
        "db": "BID",
        "id": "21252"
      },
      {
        "date": "2016-07-06T14:40:00",
        "db": "BID",
        "id": "21362"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-002497"
      },
      {
        "date": "2007-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      },
      {
        "date": "2024-11-21T00:22:21.610000",
        "db": "NVD",
        "id": "CVE-2006-6290"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MailEnable IMAP Service Multiple Buffer Overflow Vulnerabilities",
    "sources": [
      {
        "db": "BID",
        "id": "21362"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200612-084"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "21252"
      },
      {
        "db": "BID",
        "id": "21362"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…