Check Point Reference: | CPAI-2006-315 |
Date Published: | 10 Nov 2009 |
Severity: | High |
Last Updated: | Thursday 08 May, 2014 |
Source: | |
Industry Reference: | CVE-2006-6605 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | MailEnable is an email server suite for the Microsoft Windows platform. The product supports various email transfer protocols such as SMTP, POP3 and IMAP. The MailEnable protocol handlers are installed as individual services on the system, called Connectors. There exists a stack-based buffer overflow vulnerability in the MailEnable POP3 service. The flaw is caused due to a boundary error in the POP3 service when handling the argument to the POP3 "PASS" command. A remote unauthenticated user may leverage the vulnerability to inject and execute arbitrary code with System level privileges or create a denial of service condition on a vulnerable system. If an attack attempt is either unsuccessful in diverting the process flow or is meant to create a denial of service condition, then the affected service will terminate. In such a case, an event log entry will be added to System Logs of the target system, recoding the abnormal termination of the service. In a more sophisticated attack, where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the System account. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: POP3 Protocol Violation.
Attack Information: MailEnable POP3 service PASS command buffer overflow