Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command.
References
Configurations
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0299.html - | |
References | () http://secunia.com/advisories/15925/ - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-23/advisory/ - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1015048 - | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htm - Patch | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972433.htm - Patch | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972438.htm - Patch | |
References | () http://www.osvdb.org/19916 - | |
References | () http://www.securityfocus.com/bid/15080 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22727 - |
Information
Published : 2005-10-20 10:02
Updated : 2024-11-20 23:59
NVD link : CVE-2005-2469
Mitre link : CVE-2005-2469
CVE.ORG link : CVE-2005-2469
JSON object : View
Products Affected
novell
- netmail
CWE