CVE-2006-6424

Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.
References
Link Resource
http://secunia.com/advisories/23437 Patch Vendor Advisory
http://securityreason.com/securityalert/2081
http://securitytracker.com/id?1017437 Patch
http://www.cirt.dk/advisories/cirt-48-advisory.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/381161 US Government Resource
http://www.kb.cert.org/vuls/id/912505 US Government Resource
http://www.securityfocus.com/archive/1/455201/100/0/threaded
http://www.securityfocus.com/archive/1/455202/100/0/threaded
http://www.securityfocus.com/bid/21724
http://www.securityfocus.com/bid/21725
http://www.vupen.com/english/advisories/2006/5134
http://www.zerodayinitiative.com/advisories/ZDI-06-052.html Patch Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-053.html Patch Vendor Advisory
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html Patch
http://secunia.com/advisories/23437 Patch Vendor Advisory
http://securityreason.com/securityalert/2081
http://securitytracker.com/id?1017437 Patch
http://www.cirt.dk/advisories/cirt-48-advisory.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/381161 US Government Resource
http://www.kb.cert.org/vuls/id/912505 US Government Resource
http://www.securityfocus.com/archive/1/455201/100/0/threaded
http://www.securityfocus.com/archive/1/455202/100/0/threaded
http://www.securityfocus.com/bid/21724
http://www.securityfocus.com/bid/21725
http://www.vupen.com/english/advisories/2006/5134
http://www.zerodayinitiative.com/advisories/ZDI-06-052.html Patch Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-053.html Patch Vendor Advisory
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:netmail:*:e-ftfl:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.0.3a:a:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.0.3a:b:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.1:f:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:*:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:a:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:b:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:c:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:d:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:e:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:f:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:g:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.10:h:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://secunia.com/advisories/23437 - Patch, Vendor Advisory () http://secunia.com/advisories/23437 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/2081 - () http://securityreason.com/securityalert/2081 -
References () http://securitytracker.com/id?1017437 - Patch () http://securitytracker.com/id?1017437 - Patch
References () http://www.cirt.dk/advisories/cirt-48-advisory.txt - Patch, Vendor Advisory () http://www.cirt.dk/advisories/cirt-48-advisory.txt - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/381161 - US Government Resource () http://www.kb.cert.org/vuls/id/381161 - US Government Resource
References () http://www.kb.cert.org/vuls/id/912505 - US Government Resource () http://www.kb.cert.org/vuls/id/912505 - US Government Resource
References () http://www.securityfocus.com/archive/1/455201/100/0/threaded - () http://www.securityfocus.com/archive/1/455201/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455202/100/0/threaded - () http://www.securityfocus.com/archive/1/455202/100/0/threaded -
References () http://www.securityfocus.com/bid/21724 - () http://www.securityfocus.com/bid/21724 -
References () http://www.securityfocus.com/bid/21725 - () http://www.securityfocus.com/bid/21725 -
References () http://www.vupen.com/english/advisories/2006/5134 - () http://www.vupen.com/english/advisories/2006/5134 -
References () http://www.zerodayinitiative.com/advisories/ZDI-06-052.html - Patch, Vendor Advisory () http://www.zerodayinitiative.com/advisories/ZDI-06-052.html - Patch, Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-06-053.html - Patch, Vendor Advisory () http://www.zerodayinitiative.com/advisories/ZDI-06-053.html - Patch, Vendor Advisory
References () https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html - Patch () https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html - Patch

Information

Published : 2006-12-27 01:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6424

Mitre link : CVE-2006-6424

CVE.ORG link : CVE-2006-6424


JSON object : View

Products Affected

novell

  • netmail