MailEnable prior 1.52 IMAP service buffer overflows 1.0
 
Plugin ID333
Plugin nameMailEnable prior 1.52 IMAP service buffer overflows
Plugin filenameMailEnable prior 1.52 IMAP service buffer overflows.plugin
Plugin filesize2784 bytes
Plugin familySMTP
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/09
Plugin version1.0
Plugin protocoltcp
Plugin port143
Plugin procedure detectionopen|sleep|close|pattern_exists *Mail*Enable* Service*1.[0-4].* OR *Mail*Enable* Service*1.5.[0-2]*
Plugin detection accuracy80
Plugin commentThe NASL script is Copyright (C) 2004 George A. Theall
Bug produced webhttp://www.mailenable.com
Bug affectedMailEnable prior 1.52
Bug not affectedMailEnable prior 1.52 with patch, newer versions or other servers
Bug vulnerability classBuffer Overflow
Bug descriptionThe target is running at least one instance of MailEnable's IMAP service. Two flaws exist in MailEnable Professional Edition 1.52 and earlier as well as MailEnable Enterprise Edition 1.01 and earlier - a stack-based buffer overflow and an object pointer overwrite. A remote attacker can use either vulnerability to execute arbitrary code on the target. More information is available at: http://www.hat-squad.com/en/000102.html
Bug solutionApply the IMAP hotfix dated 25 November 2004 and found at http://www.mailenable.com/hotfix/default.asp
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityMaybe
Bug exploit urlhttp://www.securityfocus.com/bid/11755/exploit/
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity7
Bug simplicity6
Bug impact9
Bug risk8
Bug Nessus riskHigh
Bug check toolsNessus can check this flaw with the plugin 15852 (MailEnable IMAP Service Remote Buffer Overflows).
Source SecurityFocus BID11755
Source OSVDB ID12135
Source Nessus ID15852
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.hat-squad.com/en/000102.html

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.