Check Point Advisories

Preemptive Protection against MailEnable IMAP Service Remote Code Execution Vulnerability

Check Point Reference: CPAI-2006-150
Date Published: 19 Dec 2006
Severity: High
Last Updated: Thursday 03 May, 2007
Source: Secunia Research: 20061211
Industry Reference:CVE-2006-6423
Protection Provided by:
Who is Vulnerable? MailEnable Enterprise Edition versions 1.1 through 1.41
MailEnable Enterprise Edition versions 2.0 through 2.35
MailEnable Professional Edition versions 1.6 through 1.84
MailEnable Professional Edition versions 2.0 through 2.35
Vulnerability Description A buffer overflow vulnerability exists in MailEnable IMAP service. MailEnable is an email server suite for Microsoft Windows. Several IMAP servers contain buffer overflow errors in the way they handle IMAP commands. By carefully crafting an overly long LOGIN command, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution.
Update/Patch AvaliableApply hotfix:
http://www.mailenable.com/hotfix/ME-10025.EXE
Vulnerability DetailsThis flaw is due to a buffer overflow error when processing an overly long LOGIN command. A remote attacker can exploit this vulnerability via a specially crafted IMAP command with an overly long argument. Successful exploitation may allow an attacker to create a denial of service condition or execute arbitrary code on a affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK