Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Link | Tags |
---|---|
http://securitytracker.com/id?1017395 | vdb entry |
http://secunia.com/advisories/23127 | third party advisory patch vendor advisory |
http://securityreason.com/securityalert/2053 | third party advisory |
http://www.mailenable.com/hotfix/ | patch |
http://www.securityfocus.com/bid/21645 | vdb entry |
http://www.securityfocus.com/archive/1/454713/100/0/threaded | mailing list |
http://secunia.com/secunia_research/2006-75/advisory/ | patch vendor advisory |
http://www.vupen.com/english/advisories/2006/5052 | vdb entry |