Vulnerabilities > CVE-2006-6484 - Unspecified vulnerability in Mailenable Enterprise and Mailenable Professional
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN mailenable
nessus
Summary
The IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.34, Professional Edition 1.6 through 1.83, and Enterprise Edition 1.1 through 1.40 allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a null pointer dereference, as addressed by the ME-10023 hotfix, and a different issue than CVE-2006-6423. NOTE: some details were obtained from third party information.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | MAILENABLE_ME_10025.NASL |
description | The IMAP server bundled with the version of MailEnable installed on the remote host reportedly is affected by multiple and as yet unspecified buffer overflows. Note that it is not currently known whether the issues listed in ME-10023 and ME-10025 require authentication or not, but successful exploitation will allow an attacker to crash the service service or to execute arbitrary code with LOCAL SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23783 |
published | 2006-12-10 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23783 |
title | MailEnable IMAP Server Multiple Buffer Overflow Vulnerabilities (ME-10025) |
code |
|
References
- http://secunia.com/advisories/23267
- http://secunia.com/advisories/23267
- http://www.mailenable.com/hotfix/
- http://www.mailenable.com/hotfix/
- http://www.securityfocus.com/bid/21493
- http://www.securityfocus.com/bid/21493
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30797
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30797