Описание
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
Ссылки
- Vendor Advisory
- Patch
- Patch
- Vendor Advisory
- Vendor Advisory
- Patch
- Patch
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.00 (включая)Версия до 1.01 (включая)Версия до 1.1 (включая)Версия до 1.2 (включая)Версия до 1.02 (включая)Версия до 1.03 (включая)Версия до 1.04 (включая)Версия до 1.21 (включая)
Одно из
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.011:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.012:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.013:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.014:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.015:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.016:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.017:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.8:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.9:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.12:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.13:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.14:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.15:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.16:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.91:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.92:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.93:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.101:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.103:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.104:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.105:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.106:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.107:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.108:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.109:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.110:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.111:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.112:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.113:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.114:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.115:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.116:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.610:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.701:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.702:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.703:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.704:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5015:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5016:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5017:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5018:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.21038
Средний
5 Medium
CVSS2
Дефекты
CWE-399
Связанные уязвимости
github
почти 4 года назад
The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.
EPSS
Процентиль: 95%
0.21038
Средний
5 Medium
CVSS2
Дефекты
CWE-399