|
Family: Gain root remotely --> Category: denial
MailEnable SMTP Server NTLM Authentication Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Tries to crash MailEnable SMTP server
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote SMTP server is affected by multiple vulnerabilities.
Description :
The remote host is running MailEnable, a commercial mail server for
Windows.
The version of MailEnable Professional or MailEnable Enterprise
installed on the remote host has several problems involving its
support of NTLM authentication. A remote, unauthenticated attacker
can leverage these flaws to execute arbitrary code on the remote host
or crash the SMTP connector.
Note that NTLM authentication is not enabled in MailEnable by default
but is on the remote host.
See also :
http://labs.musecurity.com/advisories/MU-200609-01.txt
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049770.html
http://www.mailenable.com/hotfix/
Solution :
Apply the ME-10015 hotfix referenced in the vendor link above.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|