Vulnerabilities > CVE-2006-6425 - Buffer Overflow vulnerability in Novell Netmail IMAP APPEND
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command. Successful exploitation requires a valid user account. This vulnerability is addressed in the following product update: Novell, NetMail, 3.52e FTF2
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 16 |
Exploit-Db
description | Novell NetMail. CVE-2006-6425. Remote exploit for windows platform |
id | EDB-ID:16488 |
last seen | 2016-02-01 |
modified | 2010-05-09 |
published | 2010-05-09 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16488/ |
title | Novell NetMail <= 3.52d IMAP APPEND Buffer Overflow |
Metasploit
description | This module exploits a stack buffer overflow in Novell's Netmail 3.52 IMAP APPEND verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. |
id | MSF:EXPLOIT/WINDOWS/IMAP/NOVELL_NETMAIL_APPEND |
last seen | 2020-02-29 |
modified | 2017-07-24 |
published | 2007-01-01 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6425 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/imap/novell_netmail_append.rb |
title | Novell NetMail IMAP APPEND Buffer Overflow |
Packetstorm
data source | https://packetstormsecurity.com/files/download/83098/novell_netmail_append.rb.txt |
id | PACKETSTORM:83098 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83098/Novell-NetMail-3.52d-IMAP-APPEND-Buffer-Overflow.html |
title | Novell NetMail <= 3.52d IMAP APPEND Buffer Overflow |
Saint
bid | 21723 |
description | NetMail IMAP APPEND command buffer overflow |
id | mail_imap_netmailneg |
osvdb | 31362 |
title | netmail_imap_append |
type | remote |
References
- http://secunia.com/advisories/23437
- http://securityreason.com/securityalert/2080
- http://securitytracker.com/id?1017437
- http://www.kb.cert.org/vuls/id/258753
- http://www.securityfocus.com/archive/1/455200/100/0/threaded
- http://www.securityfocus.com/bid/21723
- http://www.vupen.com/english/advisories/2006/5134
- http://www.zerodayinitiative.com/advisories/ZDI-06-054.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html