what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

mailEnableDoS.txt

mailEnableDoS.txt
Posted Nov 30, 2005
Authored by Josh Zlatin

MailEnable Pro version 1.7 and MailEnable Enterprise version 1.1 are susceptible to a remote IMAP related denial of service flaw when a rename request with non existent mailbox names is presented.

tags | exploit, remote, denial of service, imap
SHA-256 | 3198f10d176771fde3a587491b924d65f7750f614ebf2bc7c1e2d7cabc92d4f9

mailEnableDoS.txt

Change Mirror Download
Synopsis: MailEnable Imap Remote DOS.

Product: MailEnable Pro
MailEnable Enterprise
http://www.mailenable.com

Version: Confirmed on MailEnable Pro 1.7 and MailEnable Enterprise 1.1

Author: Josh Zlatin-Amishav

Date: November 24, 2005

Background:
MailEnable's mail server software provides a powerful, scalable hosted
messaging platform for Microsoft Windows. MailEnable offers stability,
unsurpassed flexibility and an extensive feature set which allows you to
provide cost-effective mail services.

Issue:
In working with researchers at Tenable Network Security, I have come across
a Denial of Service attack in the MailEnable Pro and MailEnable Enterprise
IMAP server. It is possible to remotely crash the IMAP server by sending a
rename request with non existant mailbox names

PoC:
telnet localhost 143
a1 login josh byebye
a2 rename foo bar

where josh and byebye are the login credentials for an existing mailbox.

Vendor notified: November 24, 2005 10:50AM
Patch released: November 24, 2005 13:28PM

Solution:
Download patch from: http://www.mailenable.com/hotfix/MEIMAPS.ZIP

To install:
1) Stop the IMAP service
2) Rename the MEIMAPS.EXE file in the Mail Enable\bin directory as this will
allow you to roll back this fix
3) Extract the zip file from the URL above to the Mail Enable\bin directory
4) Start the IMAP service

References: http://zur.homelinux.com/Advisories/MailEnableImapDos.txt
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    17 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close