[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    See-security Advisory: Format string vulnerability in MailEnable 1.8
From:       a a <tal () see-security ! com>
Date:       2005-03-17 15:53:42
Message-ID: 38a002672188.4239c426 () default ! domain
[Download RAW message or body]

##################################################################
#                                                                                     \
# #                                        See-security Technologies ltd.             \
# #                                                                                   \
# #                                         http://www.see-security.com               \
# #                                                                                   \
# ##################################################################

[-] Product Information
MailEnable Standard Edition provides robust SMTP and POP3 services for Windows \
NT/2000/XP/2003 systems.

[-] Vulnerability Description
MailEnable contains a format string vulnerability in the it handles SMTP mailto: \
requests

[-] Exploit
Proof of concept exploit code is available at \
http://www.hackingdefined.com/exploits/mailenable.tar.gz

[-] Credits
The vulnerability was discovered by Mati Aharoni


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic