CVE-2006-6761
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2006
Last modified:
09/04/2025
Description
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:novell:netmail:3.5.2:a:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.5.2:b:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.5.2:c1:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.5.2:d:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454
- http://secunia.com/advisories/23437
- http://securitytracker.com/id?1017437=
- http://www.kb.cert.org/vuls/id/863313
- http://www.securityfocus.com/bid/21728
- http://www.vupen.com/english/advisories/2006/5134
- https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454
- http://secunia.com/advisories/23437
- http://securitytracker.com/id?1017437=
- http://www.kb.cert.org/vuls/id/863313
- http://www.securityfocus.com/bid/21728
- http://www.vupen.com/english/advisories/2006/5134
- https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html