RULE(RULE ID:905309)

Rule General Information
Release Date: 2021-03-26
Rule Name: MailEnable IMAP Activity Logging Buffer Overflow Vulnerability (CVE-2005-3155)
Severity:
CVE ID:
Rule Protection Details
Description: A buffer overflow vulnerability exists in the MailEnable server product line. The flaw is caused by insufficient sanitization of user supplied data before it is being processed by the logging facilities. Successful exploitation of this flaw allows a remote attacker to inject and execute arbitrary code on the target host. An attack may result in either a denial of service condition of the affected service or diversion of the process flow of the affected process. In the case of a successful code execution attack, the process flow will be diverted to attacker supplied code which is injected during the attack. Such an attack would most likely also result in a denial of service condition, as the IMAP server process would not retain its intended functionality. If such an attack is not successful, then a denial of service condition will result. In the case of a denial of service attack, the affected process will terminate and will have to be manually restarted in order to restore functionality.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:15006
SecurityTrackerID:1014999
http://www.mailenable.com/hotfix/
Solutions
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.