The SMTP service (MESMTPC.exe) in MailEnable 3.x and 4.25 does not properly perform a length check, which allows remote attackers to cause a denial of service (crash) via a long (1) email address in the MAIL FROM command, or (2) domain name in the RCPT TO command, which triggers an "unhandled invalid parameter error."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/41175 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2010-112/ - Vendor Advisory | |
References | () http://www.mailenable.com/Enterprise-ReleaseNotes.txt - | |
References | () http://www.mailenable.com/Professional-ReleaseNotes.txt - | |
References | () http://www.mailenable.com/Standard-ReleaseNotes.txt - | |
References | () http://www.mailenable.com/hotfix/ - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/513648/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/43182 - | |
References | () http://www.securitytracker.com/id?1024427 - |
Information
Published : 2010-09-15 18:00
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2580
Mitre link : CVE-2010-2580
CVE.ORG link : CVE-2010-2580
JSON object : View
Products Affected
mailenable
- mailenable
CWE
CWE-20
Improper Input Validation