ID

VAR-201009-0205


CVE

CVE-2010-2580


TITLE

MailEnable of SMTP service (MESMTPC.exe) Denial of service in Japan (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-002961

DESCRIPTION

The SMTP service (MESMTPC.exe) in MailEnable 3.x and 4.25 does not properly perform a length check, which allows remote attackers to cause a denial of service (crash) via a long (1) email address in the MAIL FROM command, or (2) domain name in the RCPT TO command, which triggers an "unhandled invalid parameter error.". MailEnable is a commercial mail server. MailEnable has two security vulnerabilities that allow a malicious attacker to perform a denial of service attack. - Using the strcat_s() function to append predefined log message data to the buffer without a sufficient length check can result in an illegal parameter error that cannot be handled. - Using the strcpy_s() function to copy predefined log message data to the buffer without a sufficient length check can result in an illegal parameter error that cannot be handled. MailEnable is prone to multiple remote denial-of-service vulnerabilities. An attacker can exploit these issue to crash the affected application, denying service to legitimate users. MailEnable 4.25 Standard Edition, Professional Edition, and Enterprise Edition are vulnerable; other versions may also be affected. NOTE: Other versions may also be affected. ====================================================================== 2) Severity Rating: Moderately critical Impact: Denial of Service Where: From remote ====================================================================== 3) Vendor's Description of Software "MailEnable's mail server software provides a powerful, scalable hosted messaging platform for Microsoft Windows. MailEnable offers stability, unsurpassed flexibility and an extensive feature set which allows you to provide cost-effective mail services." Product Link: http://www.mailenable.com/default.asp ====================================================================== 4) Description of Vulnerability Secunia Research has discovered two vulnerabilities in MailEnable, which can be exploited by malicious people to cause a DoS (Denial of Service). ====================================================================== 5) Solution Update to version 4.26 or apply hotfix ME-10044. ====================================================================== 6) Time Table 03/09/2010 - Requested security contact from the vendor. 04/09/2010 - Vendor response. 06/09/2010 - Vulnerability details provided to the vendor. 08/09/2010 - Vendor provides fixed version. 10/09/2010 - Secunia Research confirms fixes. 13/09/2010 - Vendor releases fixed version. 13/09/2010 - Public disclosure ====================================================================== 7) Credits Discovered by Dmitriy Pletnev, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2010-2580 for the vulnerabilities. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2010-112/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== . ---------------------------------------------------------------------- Windows Applications Insecure Library Loading The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/ The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. ---------------------------------------------------------------------- TITLE: MailEnable SMTP Service Two Denial of Service Vulnerabilities SECUNIA ADVISORY ID: SA41175 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41175/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41175 RELEASE DATE: 2010-09-13 DISCUSS ADVISORY: http://secunia.com/advisories/41175/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/41175/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=41175 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Secunia Research has discovered two vulnerabilities in MailEnable, which can be exploited by malicious people to cause a DoS (Denial of Service). ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2010-112/ MailEnable: http://www.mailenable.com/Standard-ReleaseNotes.txt http://www.mailenable.com/Professional-ReleaseNotes.txt http://www.mailenable.com/Enterprise-ReleaseNotes.txt http://www.mailenable.com/hotfix/default.asp OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2010-2580 // JVNDB: JVNDB-2010-002961 // CNVD: CNVD-2010-1970 // BID: 43182 // PACKETSTORM: 93820 // PACKETSTORM: 93779

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-1970

AFFECTED PRODUCTS

vendor:mailenablemodel:mailenablescope:eqversion:3.02

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.12

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.13

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.01

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.0

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.03

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.10

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.11

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.14

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:3.04

Trust: 1.6

vendor:mailenablemodel:mailenablescope:eqversion:4.01

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.15

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.16

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.13

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.5

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.22

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.52

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.24

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.12

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.1

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.51

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.0

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.11

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.17

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.61

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.14

Trust: 1.0

vendor:mailenablemodel:mailenablescope:lteversion:4.25

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.53

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:4.23

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.6

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.63

Trust: 1.0

vendor:mailenablemodel:mailenablescope:eqversion:3.62

Trust: 1.0

vendor:mailenablemodel:professionalscope:eqversion:4.25

Trust: 0.9

vendor:mailenablemodel:mailenablescope:eqversion:3.x and 4.25

Trust: 0.8

vendor:mailenablemodel:enterprisescope:eqversion:4.25

Trust: 0.6

vendor:mailenablemodel:enterprise editionscope:eqversion:4.25

Trust: 0.3

sources: CNVD: CNVD-2010-1970 // BID: 43182 // JVNDB: JVNDB-2010-002961 // CNNVD: CNNVD-201009-129 // NVD: CVE-2010-2580

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2580
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-2580
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201009-129
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-2580
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2010-002961 // CNNVD: CNNVD-201009-129 // NVD: CVE-2010-2580

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2010-002961 // NVD: CVE-2010-2580

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201009-129

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201009-129

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002961

PATCH

title:ME-10044url:http://www.mailenable.com/hotfix/

Trust: 0.8

title:MailEnable 'MESMTRPC.exe' SMTP Service Remote Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/1003

Trust: 0.6

title:Professional426url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34476

Trust: 0.6

title:Enterprise426url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=34475

Trust: 0.6

sources: CNVD: CNVD-2010-1970 // JVNDB: JVNDB-2010-002961 // CNNVD: CNNVD-201009-129

EXTERNAL IDS

db:NVDid:CVE-2010-2580

Trust: 3.4

db:BIDid:43182

Trust: 1.9

db:SECUNIAid:41175

Trust: 1.7

db:SECTRACKid:1024427

Trust: 1.6

db:JVNDBid:JVNDB-2010-002961

Trust: 0.8

db:CNVDid:CNVD-2010-1970

Trust: 0.6

db:BUGTRAQid:20100913 SECUNIA RESEARCH: MAILENABLE SMTP SERVICE TWO DENIAL OF SERVICE VULNERABILITIES

Trust: 0.6

db:NSFOCUSid:15747

Trust: 0.6

db:CNNVDid:CNNVD-201009-129

Trust: 0.6

db:PACKETSTORMid:93820

Trust: 0.1

db:PACKETSTORMid:93779

Trust: 0.1

sources: CNVD: CNVD-2010-1970 // BID: 43182 // JVNDB: JVNDB-2010-002961 // PACKETSTORM: 93820 // PACKETSTORM: 93779 // CNNVD: CNNVD-201009-129 // NVD: CVE-2010-2580

REFERENCES

url:http://secunia.com/secunia_research/2010-112/

Trust: 2.7

url:http://www.mailenable.com/hotfix/

Trust: 1.9

url:http://www.mailenable.com/professional-releasenotes.txt

Trust: 1.7

url:http://www.mailenable.com/standard-releasenotes.txt

Trust: 1.7

url:http://www.mailenable.com/enterprise-releasenotes.txt

Trust: 1.7

url:http://www.securitytracker.com/id?1024427

Trust: 1.6

url:http://www.securityfocus.com/bid/43182

Trust: 1.6

url:http://secunia.com/advisories/41175

Trust: 1.6

url:http://www.securityfocus.com/archive/1/513648/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2580

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2580

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/513648/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/15747

Trust: 0.6

url:http://www.mailenable.com/

Trust: 0.3

url:/archive/1/513648

Trust: 0.3

url:http://www.mailenable.com/default.asp

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/corporate/jobs/

Trust: 0.1

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.1

url:http://secunia.com/advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2580

Trust: 0.1

url:http://www.mailenable.com/hotfix/default.asp

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=41175

Trust: 0.1

url:http://secunia.com/advisories/41175/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/windows_insecure_library_loading/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/41175/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-1970 // BID: 43182 // JVNDB: JVNDB-2010-002961 // PACKETSTORM: 93820 // PACKETSTORM: 93779 // CNNVD: CNNVD-201009-129 // NVD: CVE-2010-2580

CREDITS

Dmitriy Pletnev

Trust: 0.7

sources: PACKETSTORM: 93820 // CNNVD: CNNVD-201009-129

SOURCES

db:CNVDid:CNVD-2010-1970
db:BIDid:43182
db:JVNDBid:JVNDB-2010-002961
db:PACKETSTORMid:93820
db:PACKETSTORMid:93779
db:CNNVDid:CNNVD-201009-129
db:NVDid:CVE-2010-2580

LAST UPDATE DATE

2025-04-11T23:03:18.423000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-1970date:2010-09-14T00:00:00
db:BIDid:43182date:2010-09-13T00:00:00
db:JVNDBid:JVNDB-2010-002961date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201009-129date:2010-09-17T00:00:00
db:NVDid:CVE-2010-2580date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-1970date:2010-09-14T00:00:00
db:BIDid:43182date:2010-09-13T00:00:00
db:JVNDBid:JVNDB-2010-002961date:2012-03-27T00:00:00
db:PACKETSTORMid:93820date:2010-09-14T01:27:44
db:PACKETSTORMid:93779date:2010-09-13T13:24:56
db:CNNVDid:CNNVD-201009-129date:2010-09-17T00:00:00
db:NVDid:CVE-2010-2580date:2010-09-15T18:00:25.290