IMAP: MailEnable IMAP Service Buffer Overflow
This signature detects attempts to exploit a known vulnerability exists in the way the IMAP service in MailEnable parses IMAP data. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Extended Description
MailEnable IMAP service is reported prone to multiple remote buffer overflow vulnerabilities. The following individual issues are reported: The first buffer overflow vulnerability is reported to exist due to a lack of sufficient bounds checking performed on IMAP command arguments before the argument is copied into a finite process memory buffer. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service. The second buffer overflow vulnerability presents itself due to a lack of boundary checks performed on request data sent to the IMAP service. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service.
Affected Products
Mailenable mailenable_professional
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Mailenable
7.5