Vulnerabilities > CVE-2006-6761 - Buffer Overflow vulnerability in Novell Netmail 3.5.2
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command. This vulnerability is addressed in the following product update: Novell, NetMail, 3.52e FTF2
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description | Novell NetMail. CVE-2006-6761. Remote exploit for windows platform |
id | EDB-ID:16478 |
last seen | 2016-02-01 |
modified | 2010-05-09 |
published | 2010-05-09 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16478/ |
title | Novell NetMail <= 3.52d IMAP SUBSCRIBE Buffer Overflow |
Metasploit
description | This module exploits a stack buffer overflow in Novell's NetMail 3.52 IMAP SUBSCRIBE verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. |
id | MSF:EXPLOIT/WINDOWS/IMAP/NOVELL_NETMAIL_SUBSCRIBE |
last seen | 2020-03-09 |
modified | 2017-07-24 |
published | 2007-01-01 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/imap/novell_netmail_subscribe.rb |
title | Novell NetMail IMAP SUBSCRIBE Buffer Overflow |
Packetstorm
data source | https://packetstormsecurity.com/files/download/82936/novell_netmail_subscribe.rb.txt |
id | PACKETSTORM:82936 |
last seen | 2016-12-05 |
published | 2009-10-30 |
reporter | MC |
source | https://packetstormsecurity.com/files/82936/Novell-NetMail-3.52d-IMAP-SUBSCRIBE-Buffer-Overflow.html |
title | Novell NetMail <= 3.52d IMAP SUBSCRIBE Buffer Overflow |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454
- http://secunia.com/advisories/23437
- http://securitytracker.com/id?1017437
- http://www.kb.cert.org/vuls/id/863313
- http://www.securityfocus.com/bid/21728
- http://www.vupen.com/english/advisories/2006/5134
- https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html