MailEnable IMAP服务拒绝服务漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114720 漏洞类型 输入验证
发布时间 2008-03-07 更新时间 2008-09-05
CVE编号 CVE-2008-1277 CNNVD-ID CNNVD-200803-154
漏洞平台 Windows CVSS评分 9.0
|漏洞来源
https://www.exploit-db.com/exploits/31360
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200803-154
|漏洞详情
MailEnable是一款商业性质的POP3和SMTP服务器。MailEnableProfessionalEdition和EnterpriseEdition3.13及其早期版本中的IMAP服务(MEIMAPS.exe)会允许远程攻击者通过(1)SEARCH和(2)可以造成一个NULL指示器解除参照的不含必须变量的APPEND命令,来造成一个拒绝服务(崩溃)。
|漏洞EXP
source: http://www.securityfocus.com/bid/28145/info

MailEnable is prone to multiple remote vulnerabilities in the IMAP service, including:

- Multiple buffer-overflow vulnerabilities.
- Multiple denial-of-service vulnerabilities due to a NULL-pointer exception.

An attacker may leverage these issues to execute arbitrary code in the context of the running application or to crash the application, causing a denial of service.

These issues affect MailEnable 3.13; other versions may also be vulnerable. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31360-1.zip
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31360-2.pl
|参考资料

来源:XF
名称:mailenable-imapservice-dos(41059)
链接:http://xforce.iss.net/xforce/xfdb/41059
来源:SECTRACK
名称:1019565
链接:http://www.securitytracker.com/id?1019565
来源:BID
名称:28145
链接:http://www.securityfocus.com/bid/28145
来源:BUGTRAQ
名称:20080307MultiplevulnerabilitiesinMailEnableProfessional/Enterprise3.13
链接:http://www.securityfocus.com/archive/1/archive/1/489270/100/0/threaded
来源:VUPEN
名称:ADV-2008-0799
链接:http://www.frsirt.com/english/advisories/2008/0799/references
来源:SREASON
名称:3724
链接:http://securityreason.com/securityalert/3724
来源:SECUNIA
名称:29277
链接:http://secunia.com/advisories/29277
来源:MISC
链接:http://aluigi.altervista.org/adv/maildisable-adv.txt