Get a Pentest and security assessment of your IT network.

Advisories

MailEnable SMTP Service Denial Of Service

Secunia Research has discovered two vulnerabilities in MailEnable, which can be exploited by malicious people to cause a DoS (Denial of Service). An insufficient length check when appending data to a predefined log message into a buffer using strcat_s() may result in an unhandled invalid parameter error. This can be exploited to crash the SMTP service (MESMTPC.exe) via an overly long email address in the “MAIL FROM” command. An insufficient length check when copying data with a predefined log message into a buffer using strcpy_s() may result in an unhandled invalid parameter error. This can be exploited to crash the SMTP service (MESMTPC.exe) via an overly long domain name in the “RCPT TO” command.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/93820/secunia-mailenablesmtp.txt

Source: https://packetstormsecurity.com/files/93820/MailEnable-SMTP-Service-Denial-Of-Service.html

Related posts
Advisories

57657.html

Advisories

Secunia Security Advisory 17317

Advisories

Ubuntu Security Notice 284-1

Advisories

Hardened-PHP Project Security Advisory 2006-14.139