Vulnerabilities > CVE-2006-6425 - Buffer Overflow vulnerability in Novell Netmail IMAP APPEND

047910
CVSS 9.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
novell
critical
exploit available
metasploit

Summary

Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command. Successful exploitation requires a valid user account. This vulnerability is addressed in the following product update: Novell, NetMail, 3.52e FTF2

Exploit-Db

descriptionNovell NetMail. CVE-2006-6425. Remote exploit for windows platform
idEDB-ID:16488
last seen2016-02-01
modified2010-05-09
published2010-05-09
reportermetasploit
sourcehttps://www.exploit-db.com/download/16488/
titleNovell NetMail <= 3.52d IMAP APPEND Buffer Overflow

Metasploit

descriptionThis module exploits a stack buffer overflow in Novell's Netmail 3.52 IMAP APPEND verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
idMSF:EXPLOIT/WINDOWS/IMAP/NOVELL_NETMAIL_APPEND
last seen2020-02-29
modified2017-07-24
published2007-01-01
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6425
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/imap/novell_netmail_append.rb
titleNovell NetMail IMAP APPEND Buffer Overflow

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83098/novell_netmail_append.rb.txt
idPACKETSTORM:83098
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83098/Novell-NetMail-3.52d-IMAP-APPEND-Buffer-Overflow.html
titleNovell NetMail <= 3.52d IMAP APPEND Buffer Overflow

Saint

bid21723
descriptionNetMail IMAP APPEND command buffer overflow
idmail_imap_netmailneg
osvdb31362
titlenetmail_imap_append
typeremote