Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:OVERFLOW:MAILENABLE-BO

Severity

High

Recommended

No

Recommended Action

Drop

Category

IMAP

Keywords

MailEnable IMAP Service Buffer Overflow

Release Date

2013/06/20

Update Number

2275

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: MailEnable IMAP Service Buffer Overflow


This signature detects attempts to exploit a known vulnerability exists in the way the IMAP service in MailEnable parses IMAP data. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Extended Description

MailEnable IMAP service is reported prone to multiple remote buffer overflow vulnerabilities. The following individual issues are reported: The first buffer overflow vulnerability is reported to exist due to a lack of sufficient bounds checking performed on IMAP command arguments before the argument is copied into a finite process memory buffer. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service. The second buffer overflow vulnerability presents itself due to a lack of boundary checks performed on request data sent to the IMAP service. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service.

Affected Products

  • MailEnable MailEnable Enterprise Edition 1.0.0 1
  • MailEnable MailEnable Professional 1.0.0 004
  • MailEnable MailEnable Professional 1.0.0 005
  • MailEnable MailEnable Professional 1.0.0 006
  • MailEnable MailEnable Professional 1.0.0 007
  • MailEnable MailEnable Professional 1.0.0 008
  • MailEnable MailEnable Professional 1.0.0 009
  • MailEnable MailEnable Professional 1.0.0 010
  • MailEnable MailEnable Professional 1.0.0 011
  • MailEnable MailEnable Professional 1.0.0 012
  • MailEnable MailEnable Professional 1.0.0 013
  • MailEnable MailEnable Professional 1.0.0 014
  • MailEnable MailEnable Professional 1.0.0 015
  • MailEnable MailEnable Professional 1.0.0 016
  • MailEnable MailEnable Professional 1.0.0 017
  • MailEnable MailEnable Professional 1.1.0
  • MailEnable MailEnable Professional 1.101.0
  • MailEnable MailEnable Professional 1.102.0
  • MailEnable MailEnable Professional 1.103.0
  • MailEnable MailEnable Professional 1.104.0
  • MailEnable MailEnable Professional 1.105.0
  • MailEnable MailEnable Professional 1.106.0
  • MailEnable MailEnable Professional 1.107.0
  • MailEnable MailEnable Professional 1.108.0
  • MailEnable MailEnable Professional 1.109.0
  • MailEnable MailEnable Professional 1.110.0
  • MailEnable MailEnable Professional 1.111.0
  • MailEnable MailEnable Professional 1.112.0
  • MailEnable MailEnable Professional 1.113.0
  • MailEnable MailEnable Professional 1.114.0
  • MailEnable MailEnable Professional 1.115.0
  • MailEnable MailEnable Professional 1.116.0
  • MailEnable MailEnable Professional 1.12.0
  • MailEnable MailEnable Professional 1.13.0
  • MailEnable MailEnable Professional 1.14.0
  • MailEnable MailEnable Professional 1.15.0
  • MailEnable MailEnable Professional 1.16.0
  • MailEnable MailEnable Professional 1.17.0
  • MailEnable MailEnable Professional 1.18.0
  • MailEnable MailEnable Professional 1.19.0
  • MailEnable MailEnable Professional 1.2.0
  • MailEnable MailEnable Professional 1.2.0 A
  • MailEnable MailEnable Professional 1.5.0
  • MailEnable MailEnable Professional 1.51.0
  • MailEnable MailEnable Professional 1.52.0

References

  • BugTraq: 11755
  • CVE: CVE-2004-2501

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out