|
Family: Denial of Service --> Category: mixed
MailEnable IMAP rename DoS Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for rename DoS vulnerability in MailEnable's IMAP service
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote IMAP server is prone to denial of service attacks.
Description :
The remote host is running MailEnable, a commercial mail server for
Windows.
The IMAP server bundled with the version of MailEnable Professional or
Enterprise Edition installed on the remote host is prone to crash due
to incorrect handling of mailbox names in the rename command. An
authenticated remote attacker can exploit this flaw to crash the IMAP
server on the remote host.
See also :
http://www.securityfocus.com/archive/1/417589
http://www.mailenable.com/hotfix/MEIMAPS.ZIP
Solution :
Apply the IMAP Cumulative Hotfix/Update provided in the zip file
referenced above.
Threat Level:
Low / CVSS Base Score : 1.4
(AV:R/AC:L/Au:R/C:N/I:N/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|