Lucene search

K
cve[email protected]CVE-2006-6424
HistoryDec 27, 2006 - 1:28 a.m.

CVE-2006-6424

2006-12-2701:28:00
web.nvd.nist.gov
18
cve-2006-6424
novell netmail
buffer overflow
remote code execution
imap
nmap
security vulnerability

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.85 High

EPSS

Percentile

98.5%

Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.

Affected configurations

NVD
Node
novellnetmailRange3.5.2e-ftfl
OR
novellnetmailMatch3.0.1
OR
novellnetmailMatch3.0.3aa
OR
novellnetmailMatch3.0.3ab
OR
novellnetmailMatch3.1
OR
novellnetmailMatch3.1f
OR
novellnetmailMatch3.5
OR
novellnetmailMatch3.10
OR
novellnetmailMatch3.10a
OR
novellnetmailMatch3.10b
OR
novellnetmailMatch3.10c
OR
novellnetmailMatch3.10d
OR
novellnetmailMatch3.10e
OR
novellnetmailMatch3.10f
OR
novellnetmailMatch3.10g
OR
novellnetmailMatch3.10h

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.85 High

EPSS

Percentile

98.5%