CVE-2006-6424
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2006
Last modified:
09/04/2025
Description
Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.
Impact
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:novell:netmail:*:e-ftfl:*:*:*:*:*:* | 3.5.2 (including) | |
cpe:2.3:a:novell:netmail:3.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.0.3a:a:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.0.3a:b:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.1:f:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:a:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:b:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:c:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:d:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:e:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:f:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.10:g:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/23437
- http://securityreason.com/securityalert/2081
- http://securitytracker.com/id?1017437=
- http://www.cirt.dk/advisories/cirt-48-advisory.txt
- http://www.kb.cert.org/vuls/id/381161
- http://www.kb.cert.org/vuls/id/912505
- http://www.securityfocus.com/archive/1/455201/100/0/threaded
- http://www.securityfocus.com/archive/1/455202/100/0/threaded
- http://www.securityfocus.com/bid/21724
- http://www.securityfocus.com/bid/21725
- http://www.vupen.com/english/advisories/2006/5134
- http://www.zerodayinitiative.com/advisories/ZDI-06-052.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-053.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html
- http://secunia.com/advisories/23437
- http://securityreason.com/securityalert/2081
- http://securitytracker.com/id?1017437=
- http://www.cirt.dk/advisories/cirt-48-advisory.txt
- http://www.kb.cert.org/vuls/id/381161
- http://www.kb.cert.org/vuls/id/912505
- http://www.securityfocus.com/archive/1/455201/100/0/threaded
- http://www.securityfocus.com/archive/1/455202/100/0/threaded
- http://www.securityfocus.com/bid/21724
- http://www.securityfocus.com/bid/21725
- http://www.vupen.com/english/advisories/2006/5134
- http://www.zerodayinitiative.com/advisories/ZDI-06-052.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-053.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html