CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
97.8%
Stack-based buffer overflow in the SSL version of the NMDMC.EXE service in Novell NetMail 3.52e FTF2 and probably earlier allows remote attackers to execute arbitrary code via a crafted request.
Vendor | Product | Version | CPE |
---|---|---|---|
novell | netmail | 3.52 | cpe:2.3:a:novell:netmail:3.52:*:*:*:*:*:*:* |
novell | netmail | 3.52a | cpe:2.3:a:novell:netmail:3.52a:*:*:*:*:*:*:* |
novell | netmail | 3.52b | cpe:2.3:a:novell:netmail:3.52b:*:*:*:*:*:*:* |
novell | netmail | 3.52c | cpe:2.3:a:novell:netmail:3.52c:*:*:*:*:*:*:* |
novell | netmail | 3.52c1 | cpe:2.3:a:novell:netmail:3.52c1:*:*:*:*:*:*:* |
novell | netmail | 3.52d | cpe:2.3:a:novell:netmail:3.52d:*:*:*:*:*:*:* |
novell | netmail | 3.52e | cpe:2.3:a:novell:netmail:3.52e:*:*:*:*:*:*:* |
novell | netmail | 3.52e | cpe:2.3:a:novell:netmail:3.52e:ftf1:*:*:*:*:*:* |
novell | netmail | 3.52e | cpe:2.3:a:novell:netmail:3.52e:ftf2:*:*:*:*:*:* |
download.novell.com/Download?buildid=Ad2xk29hHTg~
labs.idefense.com/intelligence/vulnerabilities/display.php?id=532
osvdb.org/35941
secunia.com/advisories/25204
www.securityfocus.com/bid/23916
www.securitytracker.com/id?1018045
www.vupen.com/english/advisories/2007/1732
exchange.xforce.ibmcloud.com/vulnerabilities/34221