{ "id": "CVE-2006-1337", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-21T02:06:00.000", "lastModified": "2017-07-20T01:30:30.550", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:professional:*:*:*:*:*", "versionEndIncluding": "1.72", "matchCriteriaId": "3FE53A16-2225-473D-85CE-18680C76B8AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.2:*:professional:*:*:*:*:*", "matchCriteriaId": "A544CCF3-B0E8-41EB-B7C4-0ED0EA73F51B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.2a:*:professional:*:*:*:*:*", "matchCriteriaId": "CF075F8B-D289-420D-8372-7013CFBB6B24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.5:*:professional:*:*:*:*:*", "matchCriteriaId": "E1113E29-79D8-4A51-A1B5-BCD7AF472167" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.6:*:professional:*:*:*:*:*", "matchCriteriaId": "610E70C4-C94E-495B-814C-7F2EE959D1A7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.7:*:professional:*:*:*:*:*", "matchCriteriaId": "C3E0762D-0A1F-4340-8779-7EF7E5A0B8E1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.17:*:professional:*:*:*:*:*", "matchCriteriaId": "44B22BCD-666B-495C-8830-71A28B1C8247" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.18:*:professional:*:*:*:*:*", "matchCriteriaId": "C32BE32D-03F0-4C17-9F89-65F5D28E16DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.19:*:professional:*:*:*:*:*", "matchCriteriaId": "7F1FDBAB-2432-4A36-BB30-883856595EF8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.51:*:professional:*:*:*:*:*", "matchCriteriaId": "1D49A7E5-5B6A-478B-8DB7-8409FC55A68D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.52:*:professional:*:*:*:*:*", "matchCriteriaId": "C3CFCBFF-DB7E-411A-98BB-A2F942730048" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.53:*:professional:*:*:*:*:*", "matchCriteriaId": "D949EED6-7A58-46A0-ABE2-4388961115E5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.54:*:professional:*:*:*:*:*", "matchCriteriaId": "B4B2B6C6-D979-4670-A2EF-DF40F536A245" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.70:*:professional:*:*:*:*:*", "matchCriteriaId": "67262650-5A63-4B83-8BE6-E241AAE4FE67" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:professional:*:*:*:*:*", "matchCriteriaId": "A742262A-ECF2-41FD-AD82-0D458EAC8768" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:enterprise:*:*:*:*:*", "versionEndIncluding": "1.2", "matchCriteriaId": "C11EA525-5A5A-4C83-90C6-C401440EC75A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.00:*:enterprise:*:*:*:*:*", "matchCriteriaId": "0326FF49-77CA-49E3-9310-432FD350BAA4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "9378332B-CA61-4F05-B5AD-ABCD31DFC95D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.01:*:enterprise:*:*:*:*:*", "matchCriteriaId": "FBA7ADBD-5577-4966-AB1B-363CB5BCEE4B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.02:*:enterprise:*:*:*:*:*", "matchCriteriaId": "12A45F2C-AACD-4868-9B4F-B61A725EE0D1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.03:*:enterprise:*:*:*:*:*", "matchCriteriaId": "A1DF5BF7-3729-4E92-8843-43C632CE5861" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.04:*:enterprise:*:*:*:*:*", "matchCriteriaId": "F300C845-1CB8-41B7-9AAD-82CD8A96FC2F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:standard:*:*:*:*:*", "versionEndIncluding": "1.92", "matchCriteriaId": "6CB3AB7E-717B-496C-A289-4718E324A214" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.8:*:standard:*:*:*:*:*", "matchCriteriaId": "C0FC8AD6-6780-48CA-ADCD-A81054E44FAB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:standard:*:*:*:*:*", "matchCriteriaId": "143CBE04-3863-487D-B825-00154E8351F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.72:*:standard:*:*:*:*:*", "matchCriteriaId": "C88F4AF1-B4C4-4A13-AA53-25768EE50135" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.90:*:standard:*:*:*:*:*", "matchCriteriaId": "225DC78B-AEA7-4795-97C5-D281CCABFACB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.91:*:standard:*:*:*:*:*", "matchCriteriaId": "D9A72240-954D-4363-B8F2-7D3B1875AC68" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.701:*:standard:*:*:*:*:*", "matchCriteriaId": "F70DFB03-157E-43CD-8015-5F95B14C0220" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.702:*:standard:*:*:*:*:*", "matchCriteriaId": "C2340571-F7B1-4F0F-BA33-82215C72A5F0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.703:*:standard:*:*:*:*:*", "matchCriteriaId": "282C4130-A381-4E23-9F36-19951250D144" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mailenable:mailenable:1.704:*:standard:*:*:*:*:*", "matchCriteriaId": "18309658-7BF6-4E12-877D-77920545723A" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1359.html", "source": "cve@mitre.org" }, { "url": "http://securitytracker.com/id?1015797", "source": "cve@mitre.org" }, { "url": "http://www.mailenable.com/enterprisehistory.asp", "source": "cve@mitre.org" }, { "url": "http://www.mailenable.com/professionalhistory.asp", "source": "cve@mitre.org" }, { "url": "http://www.mailenable.com/standardhistory.asp", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/17162", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/1006", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25314", "source": "cve@mitre.org" } ] }