Check Point Advisories

Preemptive Protection against MailEnable POP3 Remote Code Execution Vulnerability

Check Point Reference: CPAI-2006-156
Date Published: 31 Dec 2006
Severity: Critical
Last Updated: Wednesday 02 May, 2007
Source: Secunia Advisory: SA23127
Industry Reference:CVE-2006-6605
Protection Provided by:
Who is Vulnerable? MailEnable Standard Edition version 1.98 and prior
MailEnable Enterprise Edition version 2.35 and prior
MailEnable Professional Edition version 2.35 and prior
Vulnerability Description A buffer overflow vulnerability exists in MailEnable service. MailEnable is an email server suite for Microsoft Windows. Several mail servers contain buffer overflow errors in the way they handle commands. By carefully crafting an overly long POP3 'PASS' command, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution.
Update/Patch AvaliableApply patch:
http://www.mailenable.com/hotfix/ME-10026.EXE
Vulnerability DetailsThis flaw is due to a buffer overflow error in the POP service when processing an overly long 'PASS' command. A remote attacker can exploit this vulnerability via a specially crafted POP3 command with an overly long argument. Successful exploitation may allow an attacker to create a denial of service condition or execute arbitrary code on a affected system. 

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK