CVE-2006-3277
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
28/06/2006
Last modified:
03/04/2025
Description
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.00 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.01 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.1 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.2 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.02 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.03 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.04 (including) | |
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:* | 1.21 (including) | |
cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:* | ||
cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:* | ||
cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:* | ||
cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:* | ||
cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:* | ||
cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:* | ||
cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/20790
- http://securitytracker.com/id?1016376=
- http://www.divisionbyzero.be/?p=173
- http://www.divisionbyzero.be/?p=174
- http://www.mailenable.com/hotfix/mesmtpc.zip
- http://www.osvdb.org/26791
- http://www.securityfocus.com/archive/1/438374/100/0/threaded
- http://www.securityfocus.com/bid/18630
- http://www.vupen.com/english/advisories/2006/2520
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27387
- http://secunia.com/advisories/20790
- http://securitytracker.com/id?1016376=
- http://www.divisionbyzero.be/?p=173
- http://www.divisionbyzero.be/?p=174
- http://www.mailenable.com/hotfix/mesmtpc.zip
- http://www.osvdb.org/26791
- http://www.securityfocus.com/archive/1/438374/100/0/threaded
- http://www.securityfocus.com/bid/18630
- http://www.vupen.com/english/advisories/2006/2520
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27387