Loading
Generated remediation guidance and an executive summary. No account required.
The NTLM authentication in MailEnable Professional 2.0 and Enterprise 2.0 allows remote attackers to (1) execute arbitrary code via unspecified vectors involving crafted base64 encoded NTLM Type 3 messages, or (2) cause a denial of service via crafted base64 encoded NTLM Type 1 messages, which trigger a buffer over-read.
Use CWE-119, Mailenable vendor hub and Mailenable Enterprise product page to widen CVE-2006-5177 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2006-6997, CVE-2006-6605 and CVE-2006-6423 for nearby disclosures in the same product family.