VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2580
mailenable: The SMTP service (MESMTPC.exe) in MailEnable 3.x an...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2580

Original

The SMTP service (MESMTPC.exe) in MailEnable 3.x and 4.25 does not properly perform a length check, which allows remote attackers to cause a denial of service (crash) via a long (1) email address in the MAIL FROM command, or (2) domain name in the RCPT TO command, which triggers an "unhandled invalid parameter error."

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-09-15
Source Information Category:
Advisory, Alert
Last Updated:
2010-09-16




Affected Product Tags
cpe:/a:mailenable:mailenable:3.01:-:enterprise
cpe:/a:mailenable:mailenable:3.01:-:pro
cpe:/a:mailenable:mailenable:3.02:-:enterprise
cpe:/a:mailenable:mailenable:3.02:-:pro
cpe:/a:mailenable:mailenable:3.03:-:enterprise
cpe:/a:mailenable:mailenable:3.03:-:pro
cpe:/a:mailenable:mailenable:3.04:-:enterprise
cpe:/a:mailenable:mailenable:3.04:-:pro
cpe:/a:mailenable:mailenable:3.0:-:enterprise
cpe:/a:mailenable:mailenable:3.0:-:pro
cpe:/a:mailenable:mailenable:3.10:-:enterprise
cpe:/a:mailenable:mailenable:3.10:-:pro
cpe:/a:mailenable:mailenable:3.11:-:enterprise
cpe:/a:mailenable:mailenable:3.11:-:pro
cpe:/a:mailenable:mailenable:3.12:-:enterprise
cpe:/a:mailenable:mailenable:3.12:-:pro
cpe:/a:mailenable:mailenable:3.13:-:enterprise
cpe:/a:mailenable:mailenable:3.13:-:pro
cpe:/a:mailenable:mailenable:3.14:-:enterprise
cpe:/a:mailenable:mailenable:3.14:-:pro
cpe:/a:mailenable:mailenable:3.51:-:enterprise
cpe:/a:mailenable:mailenable:3.51:-:pro
cpe:/a:mailenable:mailenable:3.52:-:enterprise
cpe:/a:mailenable:mailenable:3.52:-:pro
cpe:/a:mailenable:mailenable:3.53:-:enterprise
cpe:/a:mailenable:mailenable:3.53:-:pro
cpe:/a:mailenable:mailenable:3.5:-:enterprise
cpe:/a:mailenable:mailenable:3.5:-:pro
cpe:/a:mailenable:mailenable:3.61:-:enterprise
cpe:/a:mailenable:mailenable:3.61:-:pro
cpe:/a:mailenable:mailenable:3.61:-:std
cpe:/a:mailenable:mailenable:3.62:-:enterprise
cpe:/a:mailenable:mailenable:3.62:-:pro
cpe:/a:mailenable:mailenable:3.62:-:std
cpe:/a:mailenable:mailenable:3.63:-:enterprise
cpe:/a:mailenable:mailenable:3.63:-:pro
cpe:/a:mailenable:mailenable:3.63:-:std
cpe:/a:mailenable:mailenable:3.6:-:enterprise
cpe:/a:mailenable:mailenable:3.6:-:pro
cpe:/a:mailenable:mailenable:4.01:-:enterprise
cpe:/a:mailenable:mailenable:4.01:-:pro
cpe:/a:mailenable:mailenable:4.01:-:std
cpe:/a:mailenable:mailenable:4.0:-:enterprise
cpe:/a:mailenable:mailenable:4.0:-:pro
cpe:/a:mailenable:mailenable:4.0:-:std
cpe:/a:mailenable:mailenable:4.11:-:enterprise
cpe:/a:mailenable:mailenable:4.11:-:pro
cpe:/a:mailenable:mailenable:4.12:-:enterprise
cpe:/a:mailenable:mailenable:4.12:-:pro
cpe:/a:mailenable:mailenable:4.13:-:enterprise
cpe:/a:mailenable:mailenable:4.13:-:pro
cpe:/a:mailenable:mailenable:4.13:-:std
cpe:/a:mailenable:mailenable:4.14:-:enterprise
cpe:/a:mailenable:mailenable:4.14:-:pro
cpe:/a:mailenable:mailenable:4.14:-:std
cpe:/a:mailenable:mailenable:4.15:-:enterprise
cpe:/a:mailenable:mailenable:4.15:-:pro
cpe:/a:mailenable:mailenable:4.16:-:enterprise
cpe:/a:mailenable:mailenable:4.16:-:pro
cpe:/a:mailenable:mailenable:4.16:-:std
cpe:/a:mailenable:mailenable:4.17:-:enterprise
cpe:/a:mailenable:mailenable:4.17:-:pro
cpe:/a:mailenable:mailenable:4.17:-:std
cpe:/a:mailenable:mailenable:4.1:-:enterprise
cpe:/a:mailenable:mailenable:4.1:-:pro
cpe:/a:mailenable:mailenable:4.1:-:std
cpe:/a:mailenable:mailenable:4.22:-:enterprise
cpe:/a:mailenable:mailenable:4.22:-:pro
cpe:/a:mailenable:mailenable:4.22:-:std
cpe:/a:mailenable:mailenable:4.23:-:enterprise
cpe:/a:mailenable:mailenable:4.23:-:pro
cpe:/a:mailenable:mailenable:4.23:-:std
cpe:/a:mailenable:mailenable:4.24:-:enterprise
cpe:/a:mailenable:mailenable:4.24:-:pro
cpe:/a:mailenable:mailenable:4.24:-:std
cpe:/a:mailenable:mailenable:4.25:-:enterprise and previous versions
cpe:/a:mailenable:mailenable:4.25:-:pro and previous versions
cpe:/a:mailenable:mailenable:4.25:-:std and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
BID 43182




BUGTRAQ 20100913 Secunia Research: MailEnable SMTP Service Two Denial of Service Vulnerabilities




CONFIRM http://www.mailenable.com/hotfix/




CONFIRM http://www.mailenable.com/Standard-ReleaseNotes.txt




CONFIRM http://www.mailenable.com/Professional-ReleaseNotes.txt




CONFIRM http://www.mailenable.com/Enterprise-ReleaseNotes.txt




MISC http://secunia.com/secunia_research/2010-112/




SECTRACK 1024427




SECUNIA 41175




Vulnerability Type Input Validation (CWE-20)





Copyright © 2010 JPCERT/CC All Rights Reserved.