MailEnable 1.5a to 1.5e IMAP search denial of service 1.0
 
Plugin ID311
Plugin nameMailEnable 1.5a to 1.5e IMAP search denial of service
Plugin filenameMailEnable 1.5a to 1.5e IMAP search denial of service.plugin
Plugin filesize2425 bytes
Plugin familySMTP
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/05
Plugin version1.0
Plugin protocoltcp
Plugin port143
Plugin procedure detectionopen|sleep|close|pattern_exists *Mail*Enable* Service*1.5*
Plugin detection accuracy70
Plugin commentThe NASL script was written by George A. Theall
Bug vulnerability classDenial Of Service
Bug descriptionThe target is running at least one instance of MailEnable's IMAP service. A flaw exists in MailEnable Professional Edition versions 1.5a-d that results in this service crashing if it receives a SEARCH command. An authenticated user could send this command either on purpose as a denial of service attack or unwittingly since some IMAP clients, such as IMP and Vmail, use it as part of the normal login process.
Bug solutionUpgrade to MailEnable Professional 1.5e.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.securityfocus.com/bid/11578/exploit/
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity4
Bug simplicity5
Bug impact7
Bug risk6
Bug Nessus riskMedium
Bug check toolsNessus can check and exploit this flaw with the plugin 15611 (MailEnable Unspecified Vulnerability).
Source SecurityFocus BID11418
Source OSVDB ID10728
Source Nessus ID15487
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.