SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   MailEnable Vendors:   MailEnable Pty. Ltd.
MailEnable Buffer Overflow in POP3 PASS Command Lets Remote Authenticated Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017395
SecurityTracker URL:  http://securitytracker.com/id/1017395
CVE Reference:   CVE-2006-6605   (Links to External Site)
Date:  Dec 18 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.35
Description:   A vulnerability was reported in MailEnable. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can send a specially crafted POP3 PASS command to trigger a stack overflow and execute arbitrary code on the target system. The code will run with the privileges of the target service.

The vendor was notified on December 18, 2006.

Carsten Eiram of Secunia Research discovered this vulnerability.

Impact:   A remote authenticated user can execute arbitrary code on the target system.
Solution:   The vendor has issued a hotfix, available at:

http://www.mailenable.com/hotfix/ME-10026.EXE

Vendor URL:  www.mailenable.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents

Subject:  Secunia Research: MailEnable POP Service "PASS" Command Buffer

====================================================================== 

                     Secunia Research 18/12/2006

      - MailEnable POP Service "PASS" Command Buffer Overflow -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

* MailEnable Enterprise Edition 2.35
* MailEnable Professional Edition 2.35

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Highly critical
Impact: System Compromise
Where:  Remote

====================================================================== 
3) Vendor's Description of Software 

"MailEnable's mail server software provides a powerful, scalable
hosted messaging platform for Microsoft Windows. MailEnable? offers
stability, unsurpassed flexibility and an extensive feature set which
allows you to provide cost-effective mail services".

Product Link:
http://mailenable.com/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in MailEnable, which
can be exploited by malicious people to compromise a vulnerable
system.

The vulnerability is caused due to a boundary error in the POP service
when handling arguments passed to the "PASS" command. This can be
exploited to cause a stack-based buffer overflow by passing an overly
long, specially crafted string as argument to the affected command.

Successful exploitation allows execution of arbitrary code.

====================================================================== 
5) Solution 

Apply hotfix:
http://www.mailenable.com/hotfix/ME-10026.EXE

====================================================================== 
6) Time Table 

18/12/2006 - Vendor notified.
18/12/2006 - Vendor response and hotfix released.
18/12/2006 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Carsten Eiram, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2006-6605 for the vulnerability.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below to
see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/ 

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-75/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC