module

MailEnable IMAPD W3C Logging Buffer Overflow

Disclosed
Oct 3, 2005
Created
May 30, 2018

Description

This module exploits a buffer overflow in the W3C logging
functionality of the MailEnable IMAPD service. Logging is
not enabled by default and this exploit requires a valid
username and password to exploit the flaw. MailEnable
Professional version 1.6 and prior and MailEnable Enterprise
version 1.1 and prior are affected.

Author

MC mc@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/imap/mailenable_w3c_select
msf exploit(mailenable_w3c_select) > show targets
...targets...
msf exploit(mailenable_w3c_select) > set TARGET < target-id >
msf exploit(mailenable_w3c_select) > show options
...show and set options...
msf exploit(mailenable_w3c_select) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.