MailEnable IMAP service is reported prone to multiple remote buffer overflow vulnerabilities. The following individual issues are reported: The first buffer overflow vulnerability is reported to exist due to a lack of sufficient bounds checking performed on IMAP command arguments before the argument is copied into a finite process memory buffer. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service. The second buffer overflow vulnerability presents itself due to a lack of boundary checks performed on request data sent to the IMAP service. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service.
MailEnable IMAP service is reported prone to multiple remote buffer overflow vulnerabilities. The following individual issues are reported: The first buffer overflow vulnerability is reported to exist due to a lack of sufficient bounds checking performed on IMAP command arguments before the argument is copied into a finite process memory buffer. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service. The second buffer overflow vulnerability presents itself due to a lack of boundary checks performed on request data sent to the IMAP service. A remote attacker may exploit this vulnerability prior to authentication to execute arbitrary code in the context of the affected service.