Stack-based buffer overflow in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to execute arbitrary code via a long mailbox name in the (1) select, (2) create, (3) delete, (4) rename, (5) subscribe, or (6) unsubscribe commands.
Link | Tags |
---|---|
http://secunia.com/advisories/17633 | third party advisory patch vendor advisory |
http://www.vupen.com/english/advisories/2005/2484 | vdb entry |
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0581.html | mailing list |
http://secunia.com/secunia_research/2005-59/advisory/ | patch vendor advisory |
http://www.mailenable.com/hotfix/ | patch |
http://securitytracker.com/id?1015239 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23110 | vdb entry |
http://www.securityfocus.com/bid/15492 | vdb entry |
http://www.osvdb.org/20929 | vdb entry |