Required CVE Record Information
Description
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
References 7 Total
- exchange.xforce.ibmcloud.com: mailenable-base64-message-code-execution(29287) vdb-entry
- secunia.com: 22179 third-party-advisory
- http://www.mailenable.com/hotfix/
- exchange.xforce.ibmcloud.com: mailenable-base64-ntml-message-dos(29286) vdb-entry
- securityfocus.com: 20290 vdb-entry
- vupen.com: ADV-2006-3862 vdb-entry
- http://labs.musecurity.com/advisories/MU-200609-01.txt
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- exchange.xforce.ibmcloud.com: mailenable-base64-message-code-execution(29287) vdb-entryx_transferred
- secunia.com: 22179 third-party-advisoryx_transferred
- http://www.mailenable.com/hotfix/ x_transferred
- exchange.xforce.ibmcloud.com: mailenable-base64-ntml-message-dos(29286) vdb-entryx_transferred
- securityfocus.com: 20290 vdb-entryx_transferred
- vupen.com: ADV-2006-3862 vdb-entryx_transferred
- http://labs.musecurity.com/advisories/MU-200609-01.txt x_transferred