vendor:
MailEnable POP Server
by:
redsand
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: MailEnable POP Server
Affected Version From: 01.02
Affected Version To: 01.02
Patch Exists: YES
Related CWE: N/A
CPE: a:mailenable:mailenable_pop_server
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 9x/NT/XP
2002
MailEnable POP Server Version 1.02 DoS
An attacker can exploit this vulnerability by connecting to a vulnerable MailEnable server and sending an overly long string as the value for the USER login prompt. This will trigger the buffer overflow condition.
Mitigation:
Ensure that the POP3 server is running the latest version of MailEnable and that all security patches are applied.