Lucene search

K
saintSAINT CorporationSAINT:8F1B86241DF23534377AA9E12E1E0ACB
HistoryDec 29, 2006 - 12:00 a.m.

NetMail IMAP APPEND command buffer overflow

2006-12-2900:00:00
SAINT Corporation
www.saintcorporation.com
13

0.163 Low

EPSS

Percentile

95.5%

Added: 12/29/2006
CVE: CVE-2006-6425
BID: 21723
OSVDB: 31362

Background

Novell NetMail is an e-mail and calendaring server application.

Problem

A buffer overflow in the NetMail IMAP service allows remote, authenticated attackers to execute arbitrary commands by sending a long, specially crafted APPEND command.

Resolution

Apply NetMail 3.5.2e FTF2 for Linux, Netware, or Windows.

References

[http://www.novell.com/support/search.do?cmd=displayKC&amp;externalId=3096026&amp;sliceId=SAL_Public ](<http://www.novell.com/support/search.do?cmd=displayKC&externalId=3096026&sliceId=SAL_Public
>)
<http://www.zerodayinitiative.com/advisories/ZDI-06-054.html&gt;

Limitations

Exploit works on NetMail 3.5.2 and requires the login and password of a valid IMAP account.

Platforms

Windows 2000
Windows XP

0.163 Low

EPSS

Percentile

95.5%

Related for SAINT:8F1B86241DF23534377AA9E12E1E0ACB