Buffer overflow in the IMAP command continuation function in Novell NetMail 3.52 before 3.52C may allow remote attackers to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/15644 - Patch, Vendor Advisory | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm - | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm - Patch, Vendor Advisory | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm - Patch, Vendor Advisory | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/17239 - | |
References | () http://www.securityfocus.com/bid/13926 - | |
References | () http://www.securityfocus.com/bid/14718 - | |
References | () http://www.vupen.com/english/advisories/2005/0727 - |
Information
Published : 2005-06-08 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-1758
Mitre link : CVE-2005-1758
CVE.ORG link : CVE-2005-1758
JSON object : View
Products Affected
novell
- netmail
CWE