Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23201 - | |
References | () http://secunia.com/secunia_research/2006-73/advisory/ - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/2022 - | |
References | () http://www.mailenable.com/hotfix/ - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/454075/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21492 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30796 - |
Information
Published : 2006-12-12 02:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6423
Mitre link : CVE-2006-6423
CVE.ORG link : CVE-2006-6423
JSON object : View
Products Affected
mailenable
- mailenable_enterprise
- mailenable_professional
CWE