CVE-2006-6424
Novell NetMail IMAP Verb Literal Heap Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.
Múltiples desbordamientos de búfer en Novell NetMail anterior a 3.52e FTF2 permiten a atacantes remotos ejecutar código de su elección (1) añadiendo literales a ciertos verbos IMAP cuando se especifican peticiones de continuación de comandos a IMAPD, resultando en un desbordamiento de montón; y (2) mediante argumentos manipulados del el comando STOR para el demonio del protocolo de aplicaciones de mensajería en red (Network Messaging Application Protocol o NMAP), resultando en un desbordamiento de pila.
This vulnerability allows remote attackers to execute arbitrary code on affected versions of Novell NetMail. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the NetMail IMAP service, imapd.exe. The service does not sufficiently validate user-input length values when literals are appended to IMAP verbs to specify a command continuation request. The memory allocated to store the additional data may be insufficient, leading to an exploitable heap-based buffer overflow.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-12-09 CVE Reserved
- 2006-12-22 CVE Published
- 2010-05-09 First Exploit
- 2024-08-07 CVE Updated
- 2024-09-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/2081 | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/381161 | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/912505 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/455201/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/455202/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/21724 | Vdb Entry | |
http://www.securityfocus.com/bid/21725 | Vdb Entry | |
http://www.vupen.com/english/advisories/2006/5134 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16813 | 2010-05-09 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/23437 | 2018-10-17 | |
http://securitytracker.com/id?1017437 | 2018-10-17 | |
http://www.cirt.dk/advisories/cirt-48-advisory.txt | 2018-10-17 | |
http://www.zerodayinitiative.com/advisories/ZDI-06-052.html | 2018-10-17 | |
http://www.zerodayinitiative.com/advisories/ZDI-06-053.html | 2018-10-17 | |
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html | 2018-10-17 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | <= 3.5.2 Search vendor "Novell" for product "Netmail" and version " <= 3.5.2" | e-ftfl |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.0.1 Search vendor "Novell" for product "Netmail" and version "3.0.1" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.0.3a Search vendor "Novell" for product "Netmail" and version "3.0.3a" | a |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.0.3a Search vendor "Novell" for product "Netmail" and version "3.0.3a" | b |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.1 Search vendor "Novell" for product "Netmail" and version "3.1" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.1 Search vendor "Novell" for product "Netmail" and version "3.1" | f |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5 Search vendor "Novell" for product "Netmail" and version "3.5" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | a |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | b |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | c |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | d |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | e |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | f |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | g |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.10 Search vendor "Novell" for product "Netmail" and version "3.10" | h |
Affected
|