|
Family: Gain a shell remotely --> Category: denial
MailEnable IMAP Overflow and SMTP Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for IMAP overflow and SMTP DoS vulnerabilities in MailEnable
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote mail server is affected by multiple issues.
Description :
The remote host is running a version of MailEnable Professional or
MailEnable Enterprise Edition that is prone to the following
vulnerabilities:
- An IMAP Authenticate Request Buffer Overflow Vulnerability
Sending an AUTHENTICATE or LOGIN command with an argument
of 1016 characters or more overflows a stack-based buffer.
A possible hacker can leverage this flaw to overwrite sensitive
program control variables and thereby control execution
flow of the server process.
- An SMTP Malformed EHLO Request Denial Of Service Vulnerability
The SMTP service does not properly handle malformed EHLO
commands and may crash when it encounters an argument
containing the character 0x99. A remote attacker could use
this flaw to crash the SMTP service, thereby denying service
to legitimate users.
See also :
http://archives.neohapsis.com/archives/bugtraq/2005-04/0070.html
http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0078.html
Solution :
Apply the IMAP and SMTP hotfix from 4th April 2005 located at
http://www.mailenable.com/hotfix/. [Note that this does not fix the
overflow involving an oversize LOGIN command.]
Threat Level:
Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|