Vulnerabilities > CVE-2006-3277 - Resource Management Errors vulnerability in Mailenable Enterprise and Mailenable Professional

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
mailenable
CWE-399
nessus
exploit available

Summary

The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.

Vulnerable Configurations

Part Description Count
Application
Mailenable
66

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionMailEnable 1.x SMTP HELO Command Remote Denial of Service Vulnerability. CVE-2006-3277 . Dos exploit for windows platform
idEDB-ID:28103
last seen2016-02-03
modified2006-06-24
published2006-06-24
reporterdb0
sourcehttps://www.exploit-db.com/download/28103/
titleMailEnable 1.x SMTP HELO Command Remote Denial of Service Vulnerability

Nessus

NASL familySMTP problems
NASL idMAILENABLE_SMTP_HELO_DOS.NASL
descriptionThe remote host is running MailEnable, a commercial mail server for Windows. According to the version number in its banner, the SMTP server bundled with the installation of MailEnable on the remote host will crash when handling malformed HELO commands. An unauthenticated attacker may be able to leverage this issue to deny service to legitimate users.
last seen2020-06-01
modified2020-06-02
plugin id21771
published2006-06-28
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21771
titleMailEnable SMTP Server HELO Command Remote DoS