MailEnable Append Remote Buffer Overflow Vulnerability
BID:22792
Info
MailEnable Append Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 22792 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-1301 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 02 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | mu-b is credited with the discovery of this vulnerability. |
| Vulnerable: |
MailEnable MailEnable Professional 2.37 MailEnable MailEnable Professional 2.35 MailEnable MailEnable Professional 2.33 MailEnable MailEnable Professional 2.32 |
| Not Vulnerable: | |
Discussion
MailEnable Append Remote Buffer Overflow Vulnerability
MailEnable is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
MailEnable is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Exploit / POC
MailEnable Append Remote Buffer Overflow Vulnerability
The following exploit code is available exclusively for Immunity Partners:
https://www.immunityinc.com/downloads/immpartners/mailenable_append.tar
The following exploit is also available:
The following exploit code is available exclusively for Immunity Partners:
https://www.immunityinc.com/downloads/immpartners/mailenable_append.tar
The following exploit is also available:
Solution / Fix
MailEnable Append Remote Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you fell we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you fell we are in error or if you are aware of more recent information, please mail us at: [email protected].