CVE-2006-1337
Published Mar 21, 2006
Last updated 7 years ago
Overview
- Description
- Buffer overflow in the POP 3 (POP3) service in MailEnable Standard Edition before 1.93, Professional Edition before 1.73, and Enterprise Edition before 1.21 allows remote attackers to execute arbitrary code via unknown vectors before authentication.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FE53A16-2225-473D-85CE-18680C76B8AB", "versionEndIncluding": "1.72" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.2:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A544CCF3-B0E8-41EB-B7C4-0ED0EA73F51B" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.2a:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF075F8B-D289-420D-8372-7013CFBB6B24" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.5:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1113E29-79D8-4A51-A1B5-BCD7AF472167" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.6:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "610E70C4-C94E-495B-814C-7F2EE959D1A7" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.7:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3E0762D-0A1F-4340-8779-7EF7E5A0B8E1" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.17:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44B22BCD-666B-495C-8830-71A28B1C8247" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.18:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C32BE32D-03F0-4C17-9F89-65F5D28E16DE" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.19:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F1FDBAB-2432-4A36-BB30-883856595EF8" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.51:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D49A7E5-5B6A-478B-8DB7-8409FC55A68D" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.52:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3CFCBFF-DB7E-411A-98BB-A2F942730048" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.53:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D949EED6-7A58-46A0-ABE2-4388961115E5" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.54:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4B2B6C6-D979-4670-A2EF-DF40F536A245" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.70:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67262650-5A63-4B83-8BE6-E241AAE4FE67" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A742262A-ECF2-41FD-AD82-0D458EAC8768" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11EA525-5A5A-4C83-90C6-C401440EC75A", "versionEndIncluding": "1.2" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.00:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0326FF49-77CA-49E3-9310-432FD350BAA4" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.1:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9378332B-CA61-4F05-B5AD-ABCD31DFC95D" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.01:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBA7ADBD-5577-4966-AB1B-363CB5BCEE4B" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.02:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12A45F2C-AACD-4868-9B4F-B61A725EE0D1" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.03:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1DF5BF7-3729-4E92-8843-43C632CE5861" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.04:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F300C845-1CB8-41B7-9AAD-82CD8A96FC2F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mailenable:mailenable:*:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CB3AB7E-717B-496C-A289-4718E324A214", "versionEndIncluding": "1.92" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.8:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0FC8AD6-6780-48CA-ADCD-A81054E44FAB" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.71:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "143CBE04-3863-487D-B825-00154E8351F2" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.72:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C88F4AF1-B4C4-4A13-AA53-25768EE50135" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.90:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "225DC78B-AEA7-4795-97C5-D281CCABFACB" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.91:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9A72240-954D-4363-B8F2-7D3B1875AC68" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.701:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F70DFB03-157E-43CD-8015-5F95B14C0220" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.702:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2340571-F7B1-4F0F-BA33-82215C72A5F0" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.703:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "282C4130-A381-4E23-9F36-19951250D144" }, { "criteria": "cpe:2.3:a:mailenable:mailenable:1.704:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18309658-7BF6-4E12-877D-77920545723A" } ], "operator": "OR" } ] } ]