CVE-2006-6423
Summary
| CVE | CVE-2006-6423 |
|---|---|
| State | PUBLISHED |
| Assigner | flexera |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-12-12 02:28:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix. |
Risk And Classification
Primary CVSS: v2.0 10 from [email protected]
AV:N/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mailenable | Mailenable Enterprise | 1.1 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.11 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.12 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.13 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.14 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.15 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.16 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.17 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.18 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.19 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.2 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.21 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.22 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.23 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.24 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.25 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.26 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.27 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.28 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.29 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.30 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.31 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.32 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.33 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.34 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.35 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.36 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.37 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.38 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.39 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.40 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 1.41 | All | All | All |
| Application | Mailenable | Mailenable Enterprise | 2.35 | All | All | All |
| Application | Mailenable | Mailenable Professional | 1.84 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CXSecurity - IDS | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | |
| MailEnable™ - Hot Fixes Download Page | af854a3a-2127-422b-91ae-364da2661108 | www.mailenable.com | Patch, Vendor Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| MailEnable IMAP Service Login Remote Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| MailEnable IMAP Service Buffer Overflow Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.