Vulnerability Details : CVE-2006-6423
Public exploit exists!
Stack-based buffer overflow in the IMAP service for MailEnable Professional and Enterprise Edition 2.0 through 2.35, Professional Edition 1.6 through 1.84, and Enterprise Edition 1.1 through 1.41 allows remote attackers to execute arbitrary code via a pre-authentication command followed by a crafted parameter and a long string, as addressed by the ME-10025 hotfix.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-6423
- cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.32:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.33:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.35:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.31:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.39:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.40:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.36:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.37:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.38:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.34:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.35:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6423
37.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-6423
-
MailEnable IMAPD (2.34/2.35) Login Request Buffer Overflow
Disclosure Date: 2006-12-11First seen: 2020-04-26exploit/windows/imap/mailenable_loginMailEnable's IMAP server contains a buffer overflow vulnerability in the Login command. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2006-6423
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2006-6423
-
http://www.mailenable.com/hotfix/
MailEnable - Hot Fixes Download PagePatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30796
-
http://www.securityfocus.com/archive/1/454075/100/0/threaded
-
http://www.securityfocus.com/bid/21492
MailEnable IMAP Service Login Remote Buffer Overflow Vulnerability
-
http://secunia.com/secunia_research/2006-73/advisory/
Patch;Vendor Advisory
-
http://secunia.com/advisories/23201
-
http://securityreason.com/securityalert/2022
Jump to