Vulnerability Description
Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable Enterprise | 2.0 |
| Mailenable | Mailenable Professional | 2.0 |
Related Weaknesses (CWE)
References
- http://labs.musecurity.com/advisories/MU-200609-01.txtPatch
- http://secunia.com/advisories/22179PatchVendor Advisory
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/bid/20290Patch
- http://www.vupen.com/english/advisories/2006/3862
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29284
- http://labs.musecurity.com/advisories/MU-200609-01.txtPatch
- http://secunia.com/advisories/22179PatchVendor Advisory
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/bid/20290Patch
- http://www.vupen.com/english/advisories/2006/3862
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29284
FAQ
What is CVE-2006-5176?
CVE-2006-5176 is a vulnerability with a CVSS score of 9.3 (HIGH). Buffer overflow in NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to execute arbitrary code via "the signature field of NTLM Type 1 messages".
How severe is CVE-2006-5176?
CVE-2006-5176 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5176?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable Enterprise, Mailenable Mailenable Professional.