Trend Micro Security

MailEnable IMAP Service EXAMINE SELECT Commands Buffer Overflow

  危険度: :
  CVE識別番号: CVE-2006-6290

  概要

 Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.

  トレンドマイクロの対策

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  対応方法

  Trend Micro Deep Security DPI Rule Number: 1000863
  Trend Micro Deep Security DPI Rule Name: 1000863 - MailEnable IMAP Service EXAMINE SELECT Commands Buffer Overflow

  影響を受けるソフトウェア

  • MailEnable MailEnable Enterprise 1.1
  • MailEnable MailEnable Enterprise 1.11
  • MailEnable MailEnable Enterprise 1.12
  • MailEnable MailEnable Enterprise 1.13
  • MailEnable MailEnable Enterprise 1.14
  • MailEnable MailEnable Enterprise 1.15
  • MailEnable MailEnable Enterprise 1.16
  • MailEnable MailEnable Enterprise 1.17
  • MailEnable MailEnable Enterprise 1.18
  • MailEnable MailEnable Enterprise 1.19
  • MailEnable MailEnable Enterprise 1.2
  • MailEnable MailEnable Enterprise 1.21
  • MailEnable MailEnable Enterprise 1.22
  • MailEnable MailEnable Enterprise 1.23
  • MailEnable MailEnable Enterprise 1.24
  • MailEnable MailEnable Enterprise 1.25
  • MailEnable MailEnable Enterprise 1.26
  • MailEnable MailEnable Enterprise 1.27
  • MailEnable MailEnable Enterprise 1.28
  • MailEnable MailEnable Enterprise 1.29
  • MailEnable MailEnable Enterprise 1.30
  • MailEnable MailEnable Enterprise 2.0
  • MailEnable MailEnable Enterprise 2.01
  • MailEnable MailEnable Enterprise 2.03
  • MailEnable MailEnable Enterprise 2.04
  • MailEnable MailEnable Enterprise 2.05
  • MailEnable MailEnable Enterprise 2.06
  • MailEnable MailEnable Enterprise 2.07
  • MailEnable MailEnable Enterprise 2.08
  • MailEnable MailEnable Enterprise 2.09
  • MailEnable MailEnable Enterprise 2.1
  • MailEnable MailEnable Enterprise 2.11
  • MailEnable MailEnable Enterprise 2.12
  • MailEnable MailEnable Enterprise 2.13
  • MailEnable MailEnable Enterprise 2.14
  • MailEnable MailEnable Enterprise 2.15
  • MailEnable MailEnable Enterprise 2.16
  • MailEnable MailEnable Enterprise 2.17
  • MailEnable MailEnable Enterprise 2.18
  • MailEnable MailEnable Enterprise 2.19
  • MailEnable MailEnable Enterprise 2.2
  • MailEnable MailEnable Enterprise 2.21
  • MailEnable MailEnable Enterprise 2.22
  • MailEnable MailEnable Enterprise 2.23
  • MailEnable MailEnable Enterprise 2.24
  • MailEnable MailEnable Enterprise 2.25
  • MailEnable MailEnable Enterprise 2.26
  • MailEnable MailEnable Enterprise 2.27
  • MailEnable MailEnable Enterprise 2.28
  • MailEnable MailEnable Enterprise 2.29
  • MailEnable MailEnable Enterprise 2.30
  • MailEnable MailEnable Enterprise 2.31
  • MailEnable MailEnable Enterprise 2.32
  • MailEnable MailEnable Enterprise 2.33
  • MailEnable MailEnable Professional 1.6
  • MailEnable MailEnable Professional 1.82
  • MailEnable MailEnable Professional 2.0
  • MailEnable MailEnable Professional 2.33