Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:REQERR:INVALID_LITERAL_LEN

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

IMAP

Keywords

imap invalid literal

Release Date

2004/01/29

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: Invalid Literal Length


This anomaly triggers when it detects a protocol that contains a literal, which specifies a number of octets containing a character that is not 0 or 9.

Extended Description

MailEnable is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

  • MailEnable MailEnable Professional 2.32
  • MailEnable MailEnable Professional 2.33
  • MailEnable MailEnable Professional 2.35
  • MailEnable MailEnable Professional 2.37

References

  • BugTraq: 22792
  • CVE: CVE-2006-6424
  • CVE: CVE-2007-1301
  • CVE: CVE-2007-0221
  • CVE: CVE-2006-1158
  • URL: http://www.faqs.org/rfcs/rfc3501.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out