Vulnerabilities > CVE-2006-6423 - Remote Buffer Overflow vulnerability in MailEnable IMAP Service Login
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
Vulnerable Configurations
Exploit-Db
description | MailEnable IMAPD (2.35) Login Request Buffer Overflow. CVE-2006-6423. Remote exploit for windows platform |
id | EDB-ID:16475 |
last seen | 2016-02-01 |
modified | 2010-04-30 |
published | 2010-04-30 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16475/ |
title | MailEnable IMAPD 2.35 Login Request Buffer Overflow |
Metasploit
description | MailEnable's IMAP server contains a buffer overflow vulnerability in the Login command. |
id | MSF:EXPLOIT/WINDOWS/IMAP/MAILENABLE_LOGIN |
last seen | 2020-03-01 |
modified | 2017-07-24 |
published | 2006-12-11 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6423 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/imap/mailenable_login.rb |
title | MailEnable IMAPD (2.34/2.35) Login Request Buffer Overflow |
Nessus
NASL family | Windows |
NASL id | MAILENABLE_ME_10025.NASL |
description | The IMAP server bundled with the version of MailEnable installed on the remote host reportedly is affected by multiple and as yet unspecified buffer overflows. Note that it is not currently known whether the issues listed in ME-10023 and ME-10025 require authentication or not, but successful exploitation will allow an attacker to crash the service service or to execute arbitrary code with LOCAL SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23783 |
published | 2006-12-10 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23783 |
title | MailEnable IMAP Server Multiple Buffer Overflow Vulnerabilities (ME-10025) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83125/mailenable_login.rb.txt |
id | PACKETSTORM:83125 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83125/MailEnable-IMAPD-2.35-Login-Request-Buffer-Overflow.html |
title | MailEnable IMAPD (2.35) Login Request Buffer Overflow |
References
- http://secunia.com/advisories/23201
- http://secunia.com/secunia_research/2006-73/advisory/
- http://securityreason.com/securityalert/2022
- http://www.mailenable.com/hotfix/
- http://www.securityfocus.com/archive/1/454075/100/0/threaded
- http://www.securityfocus.com/bid/21492
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30796