Vulnerabilities > CVE-2004-2726 - Unspecified vulnerability in Mailenable 1.18
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN mailenable
nessus
Summary
HTTPMail service in MailEnable Professional 1.18 does not properly handle arguments to the Authorization header, which allows remote attackers to cause a denial of service (null dereference and application crash). NOTE: This is a different vulnerability than CVE-2005-1348.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | MAILENABLE_HTTPMAIL_AUTHORIZATION_DOS.NASL |
description | The remote host is running an instance of MailEnable that has a flaw in the HTTPMail service (MEHTTPS.exe) in the Professional and Enterprise Editions. The flaw can be exploited by issuing an HTTP request with a malformed Authorization header, which causes a NULL pointer dereference error and crashes the HTTPMail service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14654 |
published | 2004-09-03 |
reporter | This script is Copyright (C) 2004-2018 George A. Theall |
source | https://www.tenable.com/plugins/nessus/14654 |
title | MailEnable HTTPMail Service Authorization Header Handling Remote DoS |
code |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2004-05/0159.html
- http://archives.neohapsis.com/archives/bugtraq/2004-05/0159.html
- http://secunia.com/advisories/11588
- http://secunia.com/advisories/11588
- http://www.oliverkarow.de/research/MailWebHTTPAuthCrash.txt
- http://www.oliverkarow.de/research/MailWebHTTPAuthCrash.txt