Unrated severityNVD Advisory· Published Dec 5, 2006· Updated Apr 23, 2026
CVE-2006-6290
CVE-2006-6290
Description
Multiple stack-based buffer overflows in the IMAP module (MEIMAPS.EXE) in MailEnable Professional 1.6 through 1.82 and 2.0 through 2.33, and MailEnable Enterprise 1.1 through 1.30 and 2.0 through 2.33 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a long argument to the (1) EXAMINE or (2) SELECT command.
Affected products
58cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*+ 53 more
- cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.16:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.17:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.18:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.19:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.21:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.23:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.24:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.25:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.26:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.27:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.28:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.29:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:1.30:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.01:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.03:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.04:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.05:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.06:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.07:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.08:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.09:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.14:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.15:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.16:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.17:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.18:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.19:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.21:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.22:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.23:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.24:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.25:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.26:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.27:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.28:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.29:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.30:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.31:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.32:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_enterprise:2.33:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- secunia.com/secunia_research/2006-71/advisory/nvdPatchVendor Advisory
- www.mailenable.com/hotfix/nvdPatch
- secunia.com/advisories/23047nvd
- secunia.com/advisories/23080nvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- www.securityfocus.com/archive/1/453118/100/100/threadednvd
- www.securityfocus.com/bid/21362nvd
- www.vupen.com/english/advisories/2006/4673nvd
- www.vupen.com/english/advisories/2006/4778nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/30614nvd
News mentions
0No linked articles in our index yet.