IMAP: MailEnable Select Overflow

This signature detects attempts to exploit a known vulnerability against MailEnable Professional. MailEnable Professional version 1.5 and earlier can be vulnerable. Attackers can supply the SELECT command with a large input string attempting to exploit this vulnerability. Successful exploitation can lead to arbitrary remote code execution.

Extended Description

MailEnable's IMAP server is prone to a remotely exploitable stack-based buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer. Remote attackers may exploit this vulnerability to execute arbitrary machine code in the context of the affected application. This allows attackers to gain System level privileges, resulting in the complete compromise of the targeted computer.

Affected Products

Mailenable mailenable_professional

Short Name
IMAP:OVERFLOW:MAILENABLE-OF-2
Severity
Major
Recommended
False
Recommended Action
None
Category
IMAP
Keywords
MailEnable Overflow Select bid:14243
Release Date
11/23/2005
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Mailenable

Found a potential security threat?