NVD Vulnerability Detail
Search Exploit, PoC
CVE-2010-2580
Summary

The SMTP service (MESMTPC.exe) in MailEnable 3.x and 4.25 does not properly perform a length check, which allows remote attackers to cause a denial of service (crash) via a long (1) email address in the MAIL FROM command, or (2) domain name in the RCPT TO command, which triggers an "unhandled invalid parameter error."

Publication Date Sept. 16, 2010, 3 a.m.
Registration Date Jan. 29, 2021, 11:03 a.m.
Last Update Nov. 21, 2024, 10:16 a.m.
CVSS2.0 : MEDIUM
Score 5.0
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:mailenable:mailenable:4.17:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.12:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.0:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.24:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.1:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.22:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:*:-:pro:*:*:*:*:* 4.25
cpe:2.3:a:mailenable:mailenable:4.15:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.13:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.14:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.01:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.11:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.23:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.16:-:pro:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:mailenable:mailenable:4.01:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.13:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.1:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.16:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.22:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.23:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.0:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:*:-:std:*:*:*:*:* 4.25
cpe:2.3:a:mailenable:mailenable:4.14:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.17:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.24:-:std:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:mailenable:mailenable:4.22:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.11:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.24:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.01:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.17:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.12:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.16:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.1:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.13:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.14:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:*:-:enterprise:*:*:*:*:* 4.25
cpe:2.3:a:mailenable:mailenable:4.15:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:4.23:-:enterprise:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:a:mailenable:mailenable:3.62:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.61:-:std:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.63:-:std:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:a:mailenable:mailenable:3.6:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.10:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.02:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.13:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.03:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.14:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.0:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.11:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.63:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.52:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.62:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.53:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.5:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.04:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.01:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.61:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.12:-:pro:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.51:-:pro:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:a:mailenable:mailenable:3.53:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.02:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.52:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.0:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.03:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.62:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.11:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.61:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.13:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.14:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.6:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.04:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.63:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.5:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.10:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.12:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.51:-:enterprise:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable:3.01:-:enterprise:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
MailEnable の SMTP サービス (MESMTPC.exe) におけるサービス運用妨害 (DoS) の脆弱性
Title MailEnable の SMTP サービス (MESMTPC.exe) におけるサービス運用妨害 (DoS) の脆弱性
Summary

MailEnable の SMTP サービス (MESMTPC.exe) は、長さのチェックを適切に実行しないため、サービス運用妨害 (クラッシュ) 状態となる脆弱性が存在します。

Possible impacts 第三者により、(1) 過度に長い MAIL FROM コマンドの電子メールアドレスまたは (2) RCPT TO コマンドのドメイン名を介して、「未処理の無効なパラメータエラー」を誘発され、サービス運用妨害 (クラッシュ) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Sept. 13, 2010, midnight
Registration Date March 27, 2012, 6:42 p.m.
Last Update March 27, 2012, 6:42 p.m.
Affected System
MailEnable
MailEnable 3.x および 4.25
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年03月27日]
  掲載
Feb. 17, 2018, 10:37 a.m.