Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23047 - | |
References | () http://secunia.com/advisories/23080 - | |
References | () http://secunia.com/secunia_research/2006-71/advisory/ - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1017276 - | |
References | () http://securitytracker.com/id?1017319 - | |
References | () http://www.mailenable.com/hotfix/ - Patch | |
References | () http://www.securityfocus.com/archive/1/453118/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/21362 - | |
References | () http://www.vupen.com/english/advisories/2006/4673 - | |
References | () http://www.vupen.com/english/advisories/2006/4778 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30614 - |
Information
Published : 2006-12-05 11:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6290
Mitre link : CVE-2006-6290
CVE.ORG link : CVE-2006-6290
JSON object : View
Products Affected
mailenable
- mailenable_enterprise
- mailenable_professional
CWE