ID

VAR-200612-0711


CVE

CVE-2006-6290


TITLE

MailEnable IMAP Service Multiple Buffer Overflow Vulnerabilities

Trust: 0.9

sources: BID: 21362 // CNNVD: CNNVD-200612-084

DESCRIPTION

Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command. MailEnable is a commercial POP3 and SMTP server. MailEnable has a vulnerability in handling user requests. MailEnable is prone to multiple buffer-overflow vulnerabilities in the IMAP service because the application fails to properly bounds-check various types of user-supplied data. This issues are reported to affect the following MailEnable versions, but other versions may also be vulnerable: 1.6-1.86 Professional Edition 1.1-1.40 Enterprise Edition 2.0-2.33 Professional Edition 2.0-2.33 Enterprise Edition. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: MailEnable IMAP Service Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA23047 VERIFY ADVISORY: http://secunia.com/advisories/23047/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: MailEnable Enterprise Edition 1.x http://secunia.com/product/4325/ MailEnable Enterprise Edition 2.x http://secunia.com/product/10427/ MailEnable Professional 2.x http://secunia.com/product/10625/ MailEnable Professional 1.x http://secunia.com/product/3474/ DESCRIPTION: A vulnerability has been reported in MailEnable IMAP service, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Successful exploitation may allow execution of arbitrary code. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.mailenable.com/hotfix/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2006-6290 // JVNDB: JVNDB-2006-002497 // CNVD: CNVD-2006-8650 // BID: 21252 // BID: 21362 // PACKETSTORM: 52465 // PACKETSTORM: 52594

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2006-8650

AFFECTED PRODUCTS

vendor:mailenablemodel:professionalscope:eqversion:2.0

Trust: 1.6

vendor:mailenablemodel:professionalscope:eqversion:2.33

Trust: 1.6

vendor:mailenablemodel:professionalscope:eqversion:1.6

Trust: 1.6

vendor:mailenablemodel:professionalscope:eqversion:1.82

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.29

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:2.01

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.28

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.30

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.27

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:2.0

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:2.03

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:2.08

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.26

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.25

Trust: 1.6

vendor:mailenablemodel:enterprisescope:eqversion:1.15

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.06

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.12

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.16

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.24

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.22

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.13

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.2

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.14

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.18

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.18

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.14

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.15

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.05

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.33

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.11

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.31

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.28

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.27

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.17

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.26

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.24

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.32

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.22

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.21

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.23

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.19

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.25

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.29

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.2

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.17

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.04

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.07

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.12

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.1

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.1

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.16

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.13

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.21

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.11

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.30

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.09

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.23

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:2.19

Trust: 1.0

vendor:mailenablemodel:enterprisescope:eqversion:1.1 to 1.30

Trust: 0.8

vendor:mailenablemodel:enterprisescope:eqversion:and 2.0 to 2.33

Trust: 0.8

vendor:mailenablemodel:professionalscope:eqversion:1.6 to 1.82

Trust: 0.8

vendor:mailenablemodel:professionalscope:eqversion:and 2.0 to 2.33

Trust: 0.8

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:mailenablemodel:professionalscope:eqversion:1.73

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:1.21

Trust: 0.6

vendor:mailenablemodel:professionalscope:eqversion:2.32

Trust: 0.6

vendor:mailenablemodel:professionalscope:eqversion:2.2

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:1.1

Trust: 0.6

vendor:mailenablemodel:professionalscope:eqversion:2.1

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:2.2

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:2.32

Trust: 0.6

vendor:mailenablemodel:professionalscope:eqversion:1.72

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:2.1

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:1.2

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:2.0

Trust: 0.6

vendor:mailenablemodel:professionalscope:eqversion:1.7

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:2.33

Trust: 0.6

vendor:mailenablemodel:professionalscope:neversion:2.35

Trust: 0.3

vendor:mailenablemodel:enterprise editionscope:neversion:2.35

Trust: 0.3

vendor:mailenablemodel:professionalscope:eqversion:2.34

Trust: 0.3

vendor:mailenablemodel:enterprise editionscope:eqversion:0

Trust: 0.3

vendor:mailenablemodel:enterprise editionscope:eqversion:2.34

Trust: 0.3

vendor:mailenablemodel:enterprise editionscope:eqversion:1.40

Trust: 0.3

vendor:mailenablemodel:professionalscope:eqversion:1.83

Trust: 0.3

sources: CNVD: CNVD-2006-8650 // BID: 21252 // BID: 21362 // JVNDB: JVNDB-2006-002497 // CNNVD: CNNVD-200612-084 // NVD: CVE-2006-6290

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6290
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-6290
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2006-8650
value: HIGH

Trust: 0.6

CNNVD: CNNVD-200612-084
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2006-6290
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2006-8650
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2006-8650 // JVNDB: JVNDB-2006-002497 // CNNVD: CNNVD-200612-084 // NVD: CVE-2006-6290

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6290

THREAT TYPE

network

Trust: 0.6

sources: BID: 21252 // BID: 21362

TYPE

Boundary Condition Error

Trust: 0.6

sources: BID: 21252 // BID: 21362

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-002497

PATCH

title:Hot Fixesurl:http://www.mailenable.com/hotfix/

Trust: 0.8

sources: JVNDB: JVNDB-2006-002497

EXTERNAL IDS

db:NVDid:CVE-2006-6290

Trust: 2.7

db:SECUNIAid:23047

Trust: 2.3

db:SECUNIAid:23080

Trust: 2.0

db:VUPENid:ADV-2006-4778

Trust: 1.6

db:VUPENid:ADV-2006-4673

Trust: 1.6

db:SECTRACKid:1017276

Trust: 1.6

db:SECTRACKid:1017319

Trust: 1.6

db:BIDid:21362

Trust: 1.3

db:BIDid:21252

Trust: 0.9

db:JVNDBid:JVNDB-2006-002497

Trust: 0.8

db:CNVDid:CNVD-2006-8650

Trust: 0.6

db:BUGTRAQid:20061130 SECUNIA RESEARCH: MAILENABLE IMAP SERVICE TWO VULNERABILITIES

Trust: 0.6

db:XFid:30614

Trust: 0.6

db:CNNVDid:CNNVD-200612-084

Trust: 0.6

db:PACKETSTORMid:52465

Trust: 0.1

db:PACKETSTORMid:52594

Trust: 0.1

sources: CNVD: CNVD-2006-8650 // BID: 21252 // BID: 21362 // JVNDB: JVNDB-2006-002497 // PACKETSTORM: 52465 // PACKETSTORM: 52594 // CNNVD: CNNVD-200612-084 // NVD: CVE-2006-6290

REFERENCES

url:http://www.mailenable.com/hotfix/

Trust: 1.7

url:http://secunia.com/secunia_research/2006-71/advisory/

Trust: 1.6

url:http://securitytracker.com/id?1017319

Trust: 1.6

url:http://securitytracker.com/id?1017276

Trust: 1.6

url:http://secunia.com/advisories/23080

Trust: 1.6

url:http://secunia.com/advisories/23047

Trust: 1.6

url:http://www.securityfocus.com/archive/1/453118/100/100/threaded

Trust: 1.0

url:http://www.securityfocus.com/bid/21362

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4673

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4778

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30614

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6290

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-6290

Trust: 0.8

url:http://secunia.com/advisories/23047/

Trust: 0.7

url:http://www.mailenable.com/

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4778

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4673

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/453118/100/100/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/30614

Trust: 0.6

url:http://www.mailenable.com/hotfix/me-10020.zip

Trust: 0.4

url:http://secunia.com/advisories/23080/

Trust: 0.4

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/product/10427/

Trust: 0.2

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.2

url:http://secunia.com/product/3474/

Trust: 0.2

url:http://secunia.com/product/4325/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/product/10625/

Trust: 0.2

url:http://secunia.com/secunia_research/2006-71/

Trust: 0.1

sources: CNVD: CNVD-2006-8650 // BID: 21252 // BID: 21362 // JVNDB: JVNDB-2006-002497 // PACKETSTORM: 52465 // PACKETSTORM: 52594 // CNNVD: CNNVD-200612-084 // NVD: CVE-2006-6290

CREDITS

Secunia Research reported this vulnerability.

Trust: 0.9

sources: BID: 21362 // CNNVD: CNNVD-200612-084

SOURCES

db:CNVDid:CNVD-2006-8650
db:BIDid:21252
db:BIDid:21362
db:JVNDBid:JVNDB-2006-002497
db:PACKETSTORMid:52465
db:PACKETSTORMid:52594
db:CNNVDid:CNNVD-200612-084
db:NVDid:CVE-2006-6290

LAST UPDATE DATE

2024-08-14T14:08:18.914000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2006-8650date:2014-01-24T00:00:00
db:BIDid:21252date:2007-02-16T17:47:00
db:BIDid:21362date:2016-07-06T14:40:00
db:JVNDBid:JVNDB-2006-002497date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200612-084date:2007-07-24T00:00:00
db:NVDid:CVE-2006-6290date:2018-10-17T21:47:38.440

SOURCES RELEASE DATE

db:CNVDid:CNVD-2006-8650date:2006-11-23T00:00:00
db:BIDid:21252date:2006-11-23T00:00:00
db:BIDid:21362date:2006-11-30T00:00:00
db:JVNDBid:JVNDB-2006-002497date:2012-09-25T00:00:00
db:PACKETSTORMid:52465date:2006-11-26T04:47:38
db:PACKETSTORMid:52594date:2006-11-30T16:12:25
db:CNNVDid:CNNVD-200612-084date:2006-12-05T00:00:00
db:NVDid:CVE-2006-6290date:2006-12-05T11:28:00