CVE-2006-3277

The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.011:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.012:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.013:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.014:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.015:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.016:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.017:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.8:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.9:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.12:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.13:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.14:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.15:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.16:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.91:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.92:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.93:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.101:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.103:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.104:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.105:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.106:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.107:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.108:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.109:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.110:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.111:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.112:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.113:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.114:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.115:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.116:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.610:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.701:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.702:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.703:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.704:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5015:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5016:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5017:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5018:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://secunia.com/advisories/20790 - Vendor Advisory () http://secunia.com/advisories/20790 - Vendor Advisory
References () http://securitytracker.com/id?1016376 - () http://securitytracker.com/id?1016376 -
References () http://www.divisionbyzero.be/?p=173 - Patch () http://www.divisionbyzero.be/?p=173 - Patch
References () http://www.divisionbyzero.be/?p=174 - () http://www.divisionbyzero.be/?p=174 -
References () http://www.mailenable.com/hotfix/mesmtpc.zip - Patch () http://www.mailenable.com/hotfix/mesmtpc.zip - Patch
References () http://www.osvdb.org/26791 - () http://www.osvdb.org/26791 -
References () http://www.securityfocus.com/archive/1/438374/100/0/threaded - () http://www.securityfocus.com/archive/1/438374/100/0/threaded -
References () http://www.securityfocus.com/bid/18630 - () http://www.securityfocus.com/bid/18630 -
References () http://www.vupen.com/english/advisories/2006/2520 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2520 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27387 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27387 -

Information

Published : 2006-06-28 22:05

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3277

Mitre link : CVE-2006-3277

CVE.ORG link : CVE-2006-3277


JSON object : View

Products Affected

mailenable

  • mailenable_enterprise
  • mailenable_professional
CWE
CWE-399

Resource Management Errors