CVE-2007-6302
Novell NetMail AntiVirus Agent Multiple Heap Overflow Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple heap-based buffer overflows in avirus.exe in Novell NetMail 3.5.2 before Messaging Architects M+NetMail 3.52f (aka 3.5.2F) allows remote attackers to execute arbitrary code via unspecified ASCII integers used as memory allocation arguments, aka "ZDI-CAN-162."
Múltiples desbordamientos de búfer en la región heap de la memoria en el archivo avirus.exe en Novell NetMail versiones 3.5.2 anteriores a Messaging Architects M+NetMail versión 3.52f (también se conoce como 3.5.2F), permite a los atacantes remotos ejecutar código arbitrario por medio de enteros ASCII no especificados usados como argumentos de asignación de memoria, también se conoce como "ZDI-CAN-162".
These vulnerabilities allow attackers to execute arbitrary code on vulnerable installations of Novell NetMail. User interaction is not required to exploit this vulnerability.
The specific flaws exist in the AntiVirus agent which listens on a random high TCP port. The avirus.exe service protocol reads a user-supplied ASCII integer value as an argument to a memory allocation routine. The specified size is added to without any integer overflow checks and can therefore result in an under allocation. A subsequent memory copy operation can then corrupt the heap and eventually result in arbitrary code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-12-10 CVE Reserved
- 2007-12-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.messagingarchitects.com/en/support/mplusnetmail/docs/readme.pdf | X_refsource_misc | |
http://www.securityfocus.com/archive/1/484843/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/26753 | Vdb Entry | |
http://www.securitytracker.com/id?1019063 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-07-072.html | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38909 | Vdb Entry | |
https://secure-support.novell.com/KanisaPlatform/Publishing/990/3639135_f.SAL_Public.html | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/27974 | 2018-10-15 |
URL | Date | SRC |
---|---|---|
http://www.vupen.com/english/advisories/2007/4112 | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | a |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | b |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | c |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | c1 |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | d |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | e-ftfl |
Affected
|