Vulnerability Description
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable Enterprise | <= 1.04 |
| Mailenable | Mailenable Professional | <= 1.54 |
References
- http://marc.info/?l=bugtraq&m=111445834220015&w=2
- http://securitytracker.com/id?1013786
- http://www.osvdb.org/15737
- http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.plURL Repurposed
- http://marc.info/?l=bugtraq&m=111445834220015&w=2
- http://securitytracker.com/id?1013786
- http://www.osvdb.org/15737
- http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.plURL Repurposed
FAQ
What is CVE-2005-1348?
CVE-2005-1348 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
How severe is CVE-2005-1348?
CVE-2005-1348 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1348?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable Enterprise, Mailenable Mailenable Professional.