MailEnable IMAP STATUS Command Remote Overflow

high Nessus Plugin ID 19193

Synopsis

The remote IMAP server is affected by a buffer overflow vulnerability.

Description

The remote host is running a version of MailEnable's IMAP service that is prone to a buffer overflow attack when processing a STATUS command with a long mailbox name. Once authenticated, an attacker can exploit this flaw to execute arbitrary code subject to the privileges of the affected application.

Solution

Upgrade to MailEnable Professional 1.6 or later or to MailEnable Enterprise Edition 1.1 or later.

See Also

https://www.secureauth.com/?idx=467&idxseccion=10

https://seclists.org/bugtraq/2005/Jul/202

Plugin Details

Severity: High

ID: 19193

File Name: mailenable_imap_status_overflow.nasl

Version: 1.18

Type: remote

Agent: windows

Family: Windows

Published: 7/14/2005

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mailenable:mailenable

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/30/2005

Vulnerability Publication Date: 7/12/2005

Exploitable With

Core Impact

Metasploit (MailEnable IMAPD (1.54) STATUS Request Buffer Overflow)

Reference Information

CVE: CVE-2005-2278

BID: 14243