CVE-2008-1276
Summary
| CVE | CVE-2008-1276 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-03-10 23:44:00 UTC |
| Updated | 2018-10-11 20:31:00 UTC |
| Description | Multiple buffer overflows in the IMAP service (MEIMAPS.EXE) in MailEnable Professional Edition and Enterprise Edition 3.13 and earlier allow remote authenticated attackers to execute arbitrary code via long arguments to the (1) FETCH, (2) EXAMINE, and (3) UNSUBSCRIBE commands. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mailenable | Mailenable Enterprise | All | All | All | All |
| Application | Mailenable | Mailenable Professional | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| aluigi.altervista.org/adv/maildisable-adv.txt | MISC | aluigi.altervista.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| MailEnable Pro/Ent <= 3.13 (Fetch) post-auth Remote BOF Exploit | EXPLOIT-DB | www.exploit-db.com | |
| SecurityTracker.com Archives - MailEnable Buffer Overflows in FETCH, EXAMINE, and UNSUBSCRIBE Commands Let Remote Authenticated Users Execute Arbitrary Code | SECTRACK | www.securitytracker.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| SecurityReason - Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13 | SREASON | securityreason.com | |
| MailEnable 3.13 and Prior IMAP Service Multiple Remote Vulnerabilities | BID | www.securityfocus.com | Exploit |
| MailEnable IMAP Service Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.