Vulnerability Details : CVE-2006-6605
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-6605
- cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6605
50.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6605
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2006-6605
-
http://www.mailenable.com/hotfix/
MailEnable - Hot Fixes Download PagePatch
-
http://www.securityfocus.com/archive/1/454713/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/5052
-
http://www.securityfocus.com/bid/21645
-
http://securityreason.com/securityalert/2053
-
http://securitytracker.com/id?1017395
Jump to