Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gain root remotely --> Category: denial

MailEnable SMTP Server NTLM Authentication Vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Tries to crash MailEnable SMTP server

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote SMTP server is affected by multiple vulnerabilities.

Description :

The remote host is running MailEnable, a commercial mail server for
Windows.

The version of MailEnable Professional or MailEnable Enterprise
installed on the remote host has several problems involving its
support of NTLM authentication. A remote, unauthenticated attacker
can leverage these flaws to execute arbitrary code on the remote host
or crash the SMTP connector.

Note that NTLM authentication is not enabled in MailEnable by default
but is on the remote host.

See also :

http://labs.musecurity.com/advisories/MU-200609-01.txt
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049770.html
http://www.mailenable.com/hotfix/

Solution :

Apply the ME-10015 hotfix referenced in the vendor link above.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.