exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MU Security Advisory 2006-03.01

MU Security Advisory 2006-03.01
Posted Mar 22, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MailEnable POP3 Pre-Authentication Buffer Overflow [MU-200603-01] - A remote buffer overflow condition in MailEnable's POP3 service could allow for arbitrary code execution. The vulnerable code can be exercised remotely without authentication.

tags | advisory, remote, overflow, arbitrary, code execution
SHA-256 | 13622f86f57e20faad4fea32d02d1fe528d85b0c0a4897015d09a293505ad909

MU Security Advisory 2006-03.01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


MailEnable POP3 Pre-Authentication Buffer Overflow [MU-200603-01]
March 20, 2006

http://labs.musecurity.com/advisories.html

Affected Product / Versions:

MailEnable Professional 1.7, 1.71, 1.72
MailEnable Standard 1.91, 1.92
MailEnable Enterprise 1.2
MailEnable 2.0 betas

Product Overview:

"MailEnable's mail server software provides a powerful, scalable
hosted messaging platform for Microsoft Windows. MailEnable offers
stability, unsurpassed flexibility and an extensive feature set which
allows you to provide cost-effective mail services."

Vulnerability Details:

A remote buffer overflow condition in MailEnable's POP3 service could
allow for arbitrary code execution. The vulnerable code can be
exercised remotely without authentication.

A second less critical bug was also reported and remedied. The bug
involved a cryptographic implementation mistake that weakened
authentication security.

Vendor Response / Solution:

Hotfix solution to this advisory:
http://www.mailenable.com/hotfix/ME-10011.EXE

All hotfixes are available from:
http://www.mailenable.com/hotfix

All versions have been updated to include the hotfix:
http://www.mailenable.com/mailenablestandard.exe
http://www.mailenable.com/mailenableprof.exe
http://www.mailenable.com/mailenableent.exe

Mu Security would like to thank MailEnable in advance for timely
remediation of these vulnerabilities.

Credit:

This vulnerability was discovered by the Mu Security research team.

http://labs.musecurity.com/pgpkey.txt

Mu Security is an early-stage innovator creating a new class of
security analysis system. The company's mission is to widely deploy
security analysis and reduce product and application vulnerabilities.
Mu's founders include industry-recognized experts in the IDP, open
source protocol analysis tools, ethical hacking, and network
management markets The security analysis process and product solution
provide a rigorous and streamlined methodology for verifying and
improving the security readiness of any IP-based product or
application. Mu Security, headquartered in Sunnyvale, California, is
backed by preeminent venture capital firms including Accel Partners
and Benchmark Capital.

The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are no warranties, implied or express, with regard
to this information. In no event shall the author be liable for any
direct or indirect damages whatsoever arising out of or in connection
with the use or spread of this information. Any use of this
information is at the user's own risk.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (Darwin)

iD8DBQFEHy3hMl+docYeP+YRArUmAJ9vTonYk35qqowtX2nXPC/1qcKoJgCfSTcy
IXCinIZDFIdL/DDnNQwtgnk=
=Wuyy
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close