POP.Service.PASS.Command.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in MailEnable POP3 server.
The vulnerability is caused by an error when the vulnerable software handles an overlong "PASS" command. It allows a remote attacker to execute arbitrary code via sending a crafted POP3 request.
Affected Products
MailEnable MailEnable Professional 2.35
MailEnable MailEnable Enterprise Edition 2.35
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the patch,available from the web site:
http://www.mailenable.com/hotfix/ME-10026.EXE
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2018-10-24 | 13.478 | Sig Added |