Vulnerability Description
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailenable | Mailenable Enterprise | <= 2.35 |
| Mailenable | Mailenable Professional | <= 2.35 |
| Mailenable | Mailenable Standard | <= 1.98 |
References
- http://secunia.com/advisories/23127PatchVendor Advisory
- http://secunia.com/secunia_research/2006-75/advisory/PatchVendor Advisory
- http://securityreason.com/securityalert/2053
- http://securitytracker.com/id?1017395
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/archive/1/454713/100/0/threaded
- http://www.securityfocus.com/bid/21645
- http://www.vupen.com/english/advisories/2006/5052
- http://secunia.com/advisories/23127PatchVendor Advisory
- http://secunia.com/secunia_research/2006-75/advisory/PatchVendor Advisory
- http://securityreason.com/securityalert/2053
- http://securitytracker.com/id?1017395
- http://www.mailenable.com/hotfix/Patch
- http://www.securityfocus.com/archive/1/454713/100/0/threaded
- http://www.securityfocus.com/bid/21645
FAQ
What is CVE-2006-6605?
CVE-2006-6605 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote...
How severe is CVE-2006-6605?
CVE-2006-6605 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6605?
Check the references section above for vendor advisories and patch information. Affected products include: Mailenable Mailenable Enterprise, Mailenable Mailenable Professional, Mailenable Mailenable Standard.