![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.15852 |
Category: | Denial of Service |
Title: | MailEnable Multiple IMAP Buffer Overflow Vulnerabilities (Nov 2004) - Active Check |
Summary: | MailEnable is prone to multiple buffer overflow vulnerabilities; in IMAP. |
Description: | Summary: MailEnable is prone to multiple buffer overflow vulnerabilities in IMAP. Vulnerability Insight: Two flaws exist in MailEnable Professional Edition 1.52 and earlier as well as MailEnable Enterprise Edition 1.01 and earlier: A stack-based buffer overflow and an object pointer overwrite. Vulnerability Impact: A remote attacker can use either vulnerability to execute arbitrary code on the target. Solution: Apply the IMAP hotfix dated 25 November 2004 and found at the references. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-2501 BugTraq ID: 11755 http://www.securityfocus.com/bid/11755 Bugtraq: 20041125 Remote buffer overflow in MailEnable IMAP service [Hat-Squad Advisory] (Google Search) http://archives.neohapsis.com/archives/bugtraq/2004-11/0349.html http://www.hat-squad.com/en/000102.html http://www.osvdb.org/12135 http://www.osvdb.org/12136 http://securitytracker.com/id?1012327 http://secunia.com/advisories/13318 XForce ISS Database: mailenable-imap-bo(18285) https://exchange.xforce.ibmcloud.com/vulnerabilities/18285 XForce ISS Database: mailenable-imap-code-execution(18286) https://exchange.xforce.ibmcloud.com/vulnerabilities/18286 |
Copyright | Copyright (C) 2005 George A. Theall |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |