what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MU Security Advisory 2006-09.01

MU Security Advisory 2006-09.01
Posted Oct 4, 2006
Authored by MU Dynamics | Site labs.musecurity.com

Mu Security Advisory: Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP [MU-200609-01]

tags | advisory, vulnerability
SHA-256 | f16c24e6e5e0894662a9bc5a294d4f5854f06b80208788c3261aef62da2517b7

MU Security Advisory 2006-09.01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP [MU-200609-01]
September 29, 2006

http://labs.musecurity.com/advisories.html

Affected Product/Versions:

MailEnable Professional 2.0
MailEnable Enterprise 2.0

Product Overview:

"MailEnable's mail server software provides a powerful, scalable
hosted messaging platform for Microsoft Windows. MailEnable offers
stability, unsurpassed flexibility and an extensive feature set which
allows you to provide cost-effective mail services."

Vulnerability Details:

All three pre-authentication vulnerabilities are in the SMTP connector during
the NTLM authentication process, two of which can lead to arbitrary code
execution on the server. NTLM authentication is disabled by default, but can
be turned on by the administrator using the Messaging Manager. NTLM
authentication is unavailable in the Standard versions of MailEnable.

The first vulnerability is a buffer overflow while processing the signature
field of NTLM Type1 messages, leading to arbitrary code execution.

The second vulnerability is an out of bounds read while processing security
buffers in the base64 encoded NTLM Type1 message, leading to a denial of
service.

The third vulnerability is an out of bounds read during base64 decoding of
Type3 messages, leading to arbitrary code execution.

Vendor Response / Solution:

All users of MailEnable are recommended to immediately apply the hotfixes
available from the following URL:
http://www.mailenable.com/hotfix/MESMTP-060930.zip

All hotfixes are available from:
http://www.mailenable.com/hotfix

Mu Security would like to thank the MailEnable team for timely remediation of
these vulnerabilities.

History:

09/25/06 - First contact with the vendor
09/27/06 - Hotfix available for the vulnerabilities
09/29/06 - Advisory released

Credit:

These vulnerabilities were discovered by the Mu Security research team.

http://labs.musecurity.com/pgpkkey.txt

Mu Security offers a new class of security analysis system, delivering a
rigorous and streamlined methodology for verifying the robustness and security
readiness of any IP-based product or application. Founded by the pioneers of
intrusion detection and prevention technology, Mu Security is backed by
preeminent venture capital firms that include Accel Partners, Benchmark
Capital and DAG Ventures. The company is headquartered in Sunnyvale, CA. For
more information, visit the company's website at http://www.musecurity.com.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (Darwin)

iD8DBQFFHYNxMl+docYeP+YRAuTOAJ9lMgKyRqpKFcd2M/16KRbGKYP7hQCgkh8t
sXxOWSX8VLlncvT8zvw3kvo=
=j0nl
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close