The NTLM_UnPack_Type3 function in MENTLM.dll in MailEnable Professional 2.35 and earlier allows remote attackers to cause a denial of service (application crash) via certain base64-encoded data following an AUTHENTICATE NTLM command to the imap port (143/tcp), which results in an out-of-bounds read.
References
Link | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052427.html | Third Party Advisory |
http://secunia.com/advisories/24139 | Third Party Advisory |
http://securityreason.com/securityalert/2249 | Third Party Advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0333.html | Third Party Advisory |
http://osvdb.org/33195 | Broken Link |
http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0321.html | Third Party Advisory |
http://www.vupen.com/english/advisories/2007/0614 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32482 | VDB Entry |
Configurations
Information
Published : 2007-02-14 18:28
Updated : 2019-10-02 13:13
NVD link : CVE-2007-0955
Mitre link : CVE-2007-0955
JSON object : View
CWE
Products Affected
mailenable
- mailenable