Computer Security
[EN] securityvulns.ru no-pyccku


MailEnable POP3 server buffer overflow
Published:18.12.2006
Source:
SecurityVulns ID:6952
Type:remote
Threat Level:
6/10
Description:Buffer overflow in POP3 PASS command.
Affected:MAILENABLE : MailEnable Enterprise 2.35
 MAILENABLE : MailEnable Professional 2.35
CVE:CVE-2006-6605 (Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.)
Original documentdocumentSECUNIA, [Full-disclosure] Secunia Research: MailEnable POP Service "PASS" Command Buffer Overflow (18.12.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod