Lucene search

K
saintSAINT CorporationSAINT:926385E793A8F101C74F35FC712E3C19
HistoryNov 30, 2005 - 12:00 a.m.

NetMail IMAP buffer overflow

2005-11-3000:00:00
SAINT Corporation
download.saintcorporation.com
16

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.853

Percentile

98.6%

Added: 11/30/2005
CVE: CVE-2005-3314
BID: 15491
OSVDB: 20956

Background

Novell NetMail is an e-mail and calendaring server application.

Problem

A buffer overflow in the NetMail IMAP service could allow authenticated users to execute arbitrary commands using a long, specially crafted argument to certain commands.

Resolution

Install NetMail 3.52e FTF 1.

References

<http://archives.neohapsis.com/archives/vulnwatch/2005-q4/0050.html&gt;

Limitations

Exploit works against NetMail 3.5.2.

Platforms

Windows 2000
Windows XP

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.853

Percentile

98.6%