Vulnerability Description
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable Enterprise | 1.1 |
| Mailenable | Mailenable Professional | 1.6 |
References
- http://secunia.com/advisories/23047
- http://secunia.com/advisories/23080
- http://secunia.com/secunia_research/2006-71/advisory/PatchVendor Advisory
- http://securitytracker.com/id?1017276
- http://securitytracker.com/id?1017319
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/archive/1/453118/100/100/threaded
- http://www.securityfocus.com/bid/21362
- http://www.vupen.com/english/advisories/2006/4673
- http://www.vupen.com/english/advisories/2006/4778
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30614
- http://secunia.com/advisories/23047
- http://secunia.com/advisories/23080
- http://secunia.com/secunia_research/2006-71/advisory/PatchVendor Advisory
- http://securitytracker.com/id?1017276
FAQ
What is CVE-2006-6290?
CVE-2006-6290 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33...
How severe is CVE-2006-6290?
CVE-2006-6290 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6290?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable Enterprise, Mailenable Mailenable Professional.