CVE-2006-6290

Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.01:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.03:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.04:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.05:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.06:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.07:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.08:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.09:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.11:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.12:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.13:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.14:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.15:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.16:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.17:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.18:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.19:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.21:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.22:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.23:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.24:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.25:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.26:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.27:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.28:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.29:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.30:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.31:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://secunia.com/advisories/23047 - () http://secunia.com/advisories/23047 -
References () http://secunia.com/advisories/23080 - () http://secunia.com/advisories/23080 -
References () http://secunia.com/secunia_research/2006-71/advisory/ - Patch, Vendor Advisory () http://secunia.com/secunia_research/2006-71/advisory/ - Patch, Vendor Advisory
References () http://securitytracker.com/id?1017276 - () http://securitytracker.com/id?1017276 -
References () http://securitytracker.com/id?1017319 - () http://securitytracker.com/id?1017319 -
References () http://www.mailenable.com/hotfix/ - Patch () http://www.mailenable.com/hotfix/ - Patch
References () http://www.securityfocus.com/archive/1/453118/100/100/threaded - () http://www.securityfocus.com/archive/1/453118/100/100/threaded -
References () http://www.securityfocus.com/bid/21362 - () http://www.securityfocus.com/bid/21362 -
References () http://www.vupen.com/english/advisories/2006/4673 - () http://www.vupen.com/english/advisories/2006/4673 -
References () http://www.vupen.com/english/advisories/2006/4778 - () http://www.vupen.com/english/advisories/2006/4778 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30614 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30614 -

Information

Published : 2006-12-05 11:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6290

Mitre link : CVE-2006-6290

CVE.ORG link : CVE-2006-6290


JSON object : View

Products Affected

mailenable

  • mailenable_enterprise
  • mailenable_professional