Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> MailEnable IMAP Service Search DoS Vulnerability


Vulnerability Assessment Details

MailEnable IMAP Service Search DoS Vulnerability

Vulnerability Assessment Summary
Checks for Search DoS Vulnerability in MailEnable's IMAP Service

Detailed Explanation for this Vulnerability Assessment

The target is running at least one instance of MailEnable's IMAP
service. A flaw exists in MailEnable Professional Edition versions
1.5a-d that results in this service crashing if it receives a SEARCH
command. An authenticated user could send this command either on
purpose as a denial of service attack or unwittingly since some IMAP
clients, such as IMP and Vmail, use it as part of the normal login
process.

Solution : Upgrade to MailEnable Professional 1.5e or later.

Network Security Threat Level: Medium

Networks Security ID: 11418

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 George A. Theall

Cables, Connectors

Symantec Backup Exec Remote Agent (CAL) Linux or UNIX Servers Build 5629 CD
$4.99
Symantec Backup Exec Remote Agent (CAL) Linux or UNIX Servers Build 5629 CD pictureSymantec Backup Exec Remote Agent Linux UNIX, MAC, Windows NT4 Server Build 7170
$4.99
Symantec Backup Exec Remote Agent Linux UNIX, MAC, Windows NT4 Server Build 7170 pictureUBUNTU SERVER 16.04 LTS LINUX - INSTALL CDs - 32BIT - 2017
$2.95
UBUNTU SERVER 16.04 LTS LINUX - INSTALL CDs - 32BIT - 2017 pictureMicrosoft BackOffice Small Business Server 4.5 (5-client)
$80.0
Microsoft BackOffice Small Business Server 4.5 (5-client) picture


Discussions

No Discussions have been posted on this vulnerability.