Vulnerability Description
Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable Professional | 1.54 |
References
- http://marc.info/?l=bugtraq&m=112127188609993&w=2
- http://www.coresecurity.com/common/showdoc.php?idx=467&idxseccion=10ExploitPatchVendor Advisory
- http://marc.info/?l=bugtraq&m=112127188609993&w=2
- http://www.coresecurity.com/common/showdoc.php?idx=467&idxseccion=10ExploitPatchVendor Advisory
FAQ
What is CVE-2005-2278?
CVE-2005-2278 is a vulnerability with a CVSS score of 7.2 (HIGH). Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
How severe is CVE-2005-2278?
CVE-2005-2278 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2278?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable Professional.