Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/maildisable-adv.txt - | |
References | () http://secunia.com/advisories/29277 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3724 - | |
References | () http://www.securityfocus.com/archive/1/489270/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28145 - Exploit | |
References | () http://www.securitytracker.com/id?1019565 - | |
References | () http://www.vupen.com/english/advisories/2008/0799/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41058 - | |
References | () https://www.exploit-db.com/exploits/5249 - |
Information
Published : 2008-03-10 23:44
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1276
Mitre link : CVE-2008-1276
CVE.ORG link : CVE-2008-1276
JSON object : View
Products Affected
mailenable
- mailenable_enterprise
- mailenable_professional
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer