Summary
The remote IMAP server is prone to denial of service attacks.
Description :
The remote host is running MailEnable, a commercial mail server for Windows.
The IMAP server bundled with the version of MailEnable Professional or Enterprise Edition installed on the remote host is prone to crash due to incorrect handling of mailbox names in the rename command. An authenticated remote attacker can exploit this flaw to crash the IMAP server on the remote host.
Solution
Apply the IMAP Cumulative Hotfix/Update provided in the zip file referenced above.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2005-3813 -
CVSS Base Score: 4.0
AV:N/AC:L/Au:S/C:N/I:N/A:P
Related Vulnerabilities
- Beckhoff TwinCAT 'TCATSysSrv.exe' Network Packet Denial of Service Vulnerability
- Apache Subversion 'mod_dav_svn' Module Multiple DoS Vulnerabilities
- CUPS Denial of Service Vulnerability - Jun09
- Asterisk Products Invalid SDP SIP Channel Driver DoS Vulnerability
- ClamAV 'cli_pdf()' and 'cli_scanicon()' Denial of Service Vulnerabilities (Win