VYPR
Unrated severityNVD Advisory· Published Jun 28, 2006· Updated Apr 16, 2026

CVE-2006-3277

CVE-2006-3277

Description

The SMTP service of MailEnable Standard 1.92 and earlier, Professional 2.0 and earlier, and Enterprise 2.0 and earlier before the MESMTPC hotfix, allows remote attackers to cause a denial of service (application crash) via a HELO command with a null byte in the argument, possibly triggering a length inconsistency or a missing argument.

Affected products

66
  • cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*+ 64 more
    • cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.103:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.104:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.105:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.106:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.107:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.108:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.109:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.110:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.111:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.112:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.113:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.114:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.115:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.116:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.610:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.701:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.702:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.703:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.704:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.5015:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.5016:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.5017:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.5018:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.011:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.012:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.013:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.014:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.015:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.016:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.0.017:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.8:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.9:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.12:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.13:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.14:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.15:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.16:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.91:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.92:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.93:*:*:*:*:*:*:*
    • cpe:2.3:a:mailenable:mailenable_professional:1.101:*:*:*:*:*:*:*
  • cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*
    Range: <=1.00

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.