Plugin ID | 311 |
Plugin name | MailEnable 1.5a to 1.5e IMAP search denial of service |
Plugin filename | MailEnable 1.5a to 1.5e IMAP search denial of service.plugin |
Plugin filesize | 2425 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/05 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 143 |
Plugin procedure detection | open|sleep|close|pattern_exists *Mail*Enable* Service*1.5* |
Plugin detection accuracy | 70 |
Plugin comment | The NASL script was written by George A. Theall |
Bug vulnerability class | Denial Of Service |
Bug description | The target is running at least one instance of MailEnable's IMAP service. A flaw exists in MailEnable Professional Edition versions 1.5a-d that results in this service crashing if it receives a SEARCH command. An authenticated user could send this command either on purpose as a denial of service attack or unwittingly since some IMAP clients, such as IMP and Vmail, use it as part of the normal login process. |
Bug solution | Upgrade to MailEnable Professional 1.5e. |
Bug fixing time | Approx. 20 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/11578/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 4 |
Bug simplicity | 5 |
Bug impact | 7 |
Bug risk | 6 |
Bug Nessus risk | Medium |
Bug check tools | Nessus can check and exploit this flaw with the plugin 15611 (MailEnable Unspecified Vulnerability). |
Source SecurityFocus BID | 11418 |
Source OSVDB ID | 10728 |
Source Nessus ID | 15487 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |