Unrated severityNVD Advisory· Published Dec 19, 2006· Updated Apr 23, 2026
CVE-2006-6605
CVE-2006-6605
Description
Stack-based buffer overflow in the POP service in MailEnable Standard 1.98 and earlier; Professional 1.84, and 2.35 and earlier; and Enterprise 1.41, and 2.35 and earlier before ME-10026 allows remote attackers to execute arbitrary code via a long argument to the PASS command.
Affected products
5cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*range: <=2.35
- cpe:2.3:a:mailenable:mailenable_enterprise:1.41:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*range: <=2.35
- cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/23127nvdPatchVendor Advisory
- secunia.com/secunia_research/2006-75/advisory/nvdPatchVendor Advisory
- www.mailenable.com/hotfix/nvdPatch
- securityreason.com/securityalert/2053nvd
- securitytracker.com/idnvd
- www.securityfocus.com/archive/1/454713/100/0/threadednvd
- www.securityfocus.com/bid/21645nvd
- www.vupen.com/english/advisories/2006/5052nvd
News mentions
0No linked articles in our index yet.