Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
Link | Tags |
---|---|
http://securitytracker.com/id?1017276 | vdb entry |
http://www.vupen.com/english/advisories/2006/4778 | vdb entry |
http://secunia.com/advisories/23080 | third party advisory |
http://www.securityfocus.com/bid/21362 | vdb entry |
http://securitytracker.com/id?1017319 | vdb entry |
http://www.mailenable.com/hotfix/ | patch |
http://www.vupen.com/english/advisories/2006/4673 | vdb entry |
http://www.securityfocus.com/archive/1/453118/100/100/threaded | mailing list |
http://secunia.com/advisories/23047 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30614 | vdb entry |
http://secunia.com/secunia_research/2006-71/advisory/ | patch vendor advisory |