CVE-2006-6290
Summary
| CVE | CVE-2006-6290 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-12-05 11:28:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command. |
Risk And Classification
Primary CVSS: v2.0 6.5 from [email protected]
AV:N/AC:L/Au:S/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
SingleConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:S/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mailenable | Mailenable Enterprise | 1.1 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.11 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.12 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.13 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.14 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.15 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.16 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.17 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.18 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.19 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.2 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.21 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.22 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.23 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.24 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.25 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.26 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.27 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.28 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.29 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.30 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.0 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.01 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.03 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.04 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.05 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.06 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.07 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.08 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.09 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.1 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.11 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.12 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.13 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.14 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.15 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.16 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.17 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.18 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.19 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.2 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.21 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.22 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.23 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.24 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.25 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.26 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.27 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.28 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.29 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.30 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.31 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.32 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.33 | All | All | All |
| Application | Mailenable | Mailenable Professional | 1.6 | All | All | All |
| Application | Mailenable | Mailenable Professional | 1.82 | All | All | All |
| Application | Mailenable | Mailenable Professional | 2.0 | All | All | All |
| Application | Mailenable | Mailenable Professional | 2.33 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| MailEnable™ - Hot Fixes Download Page | af854a3a-2127-422b-91ae-364da2661108 | www.mailenable.com | Patch |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| MailEnable IMAP Service Two Vulnerabilities - Secunia Research - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| MailEnable IMAP Service Multiple Buffer Overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| SecurityTracker.com Archives - MailEnable IMAP Bugs Let Remote Authenticated Users Deny Service and Potentially Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| MailEnable IMAP Service Two Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityTracker.com Archives - MailEnable Buffer Overflow in IMAP Service May Let Remote Users Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| MailEnable IMAP Service Buffer Overflow Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.