Vulnerability Description
Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable | <= 1.72 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html
- http://secunia.com/advisories/19288PatchVendor Advisory
- http://securitytracker.com/id?1015797
- http://www.mailenable.com/enterprisehistory.asp
- http://www.mailenable.com/professionalhistory.asp
- http://www.mailenable.com/standardhistory.asp
- http://www.osvdb.org/24012
- http://www.securityfocus.com/bid/17162
- http://www.vupen.com/english/advisories/2006/1006Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25314
- http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html
- http://secunia.com/advisories/19288PatchVendor Advisory
- http://securitytracker.com/id?1015797
- http://www.mailenable.com/enterprisehistory.asp
- http://www.mailenable.com/professionalhistory.asp
FAQ
What is CVE-2006-1337?
CVE-2006-1337 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrar...
How severe is CVE-2006-1337?
CVE-2006-1337 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1337?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable.