Vulnerability Description
Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail directories via the mailbox name argument of the (1) create or (2) rename commands.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable Enterprise | 1.00 |
| Mailenable | Mailenable Professional | <= 1.6 |
References
- http://secunia.com/advisories/17633PatchVendor Advisory
- http://secunia.com/secunia_research/2005-59/advisory/PatchVendor Advisory
- http://securitytracker.com/id?1015239
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/bid/15494
- http://www.vupen.com/english/advisories/2005/2484
- http://secunia.com/advisories/17633PatchVendor Advisory
- http://secunia.com/secunia_research/2005-59/advisory/PatchVendor Advisory
- http://securitytracker.com/id?1015239
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/bid/15494
- http://www.vupen.com/english/advisories/2005/2484
FAQ
What is CVE-2005-3691?
CVE-2005-3691 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in the IMAP service (meimaps.exe) of MailEnable Professional 1.6 and earlier and Enterprise 1.1 and earlier allows remote attackers to create or rename arbitrary mail...
How severe is CVE-2005-3691?
CVE-2005-3691 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3691?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable Enterprise, Mailenable Mailenable Professional.