CVE-2010-2580

The SMTP service (MESMTPC.exe) in MailEnable 3.x and 4.25 does not properly perform a length check, which allows remote attackers to cause a denial of service (crash) via a long (1) email address in the MAIL FROM command, or (2) domain name in the RCPT TO command, which triggers an "unhandled invalid parameter error."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mailenable:mailenable:*:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.0:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.1:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.01:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.11:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.12:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.13:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.14:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.15:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.16:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.17:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.22:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.23:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.24:-:pro:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mailenable:mailenable:*:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.0:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.01:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.1:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.13:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.14:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.16:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.17:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.22:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.23:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.24:-:std:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mailenable:mailenable:*:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.01:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.11:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.12:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.13:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.14:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.15:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.16:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.17:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.22:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.23:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.24:-:enterprise:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:mailenable:mailenable:3.61:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.62:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.63:-:std:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:mailenable:mailenable:3.0:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.01:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.02:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.03:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.04:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.5:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.6:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.10:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.11:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.12:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.13:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.14:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.51:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.52:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.53:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.61:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.62:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.63:-:pro:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:mailenable:mailenable:3.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.01:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.02:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.03:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.04:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.5:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.6:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.10:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.11:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.12:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.13:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.14:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.51:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.52:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.53:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.61:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.62:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.63:-:enterprise:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://secunia.com/advisories/41175 - Vendor Advisory () http://secunia.com/advisories/41175 - Vendor Advisory
References () http://secunia.com/secunia_research/2010-112/ - Vendor Advisory () http://secunia.com/secunia_research/2010-112/ - Vendor Advisory
References () http://www.mailenable.com/Enterprise-ReleaseNotes.txt - () http://www.mailenable.com/Enterprise-ReleaseNotes.txt -
References () http://www.mailenable.com/Professional-ReleaseNotes.txt - () http://www.mailenable.com/Professional-ReleaseNotes.txt -
References () http://www.mailenable.com/Standard-ReleaseNotes.txt - () http://www.mailenable.com/Standard-ReleaseNotes.txt -
References () http://www.mailenable.com/hotfix/ - Patch, Vendor Advisory () http://www.mailenable.com/hotfix/ - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/513648/100/0/threaded - () http://www.securityfocus.com/archive/1/513648/100/0/threaded -
References () http://www.securityfocus.com/bid/43182 - () http://www.securityfocus.com/bid/43182 -
References () http://www.securitytracker.com/id?1024427 - () http://www.securitytracker.com/id?1024427 -

Information

Published : 2010-09-15 18:00

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2580

Mitre link : CVE-2010-2580

CVE.ORG link : CVE-2010-2580


JSON object : View

Products Affected

mailenable

  • mailenable
CWE
CWE-20

Improper Input Validation