Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23437 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/2080 - | |
References | () http://securitytracker.com/id?1017437 - Patch | |
References | () http://www.kb.cert.org/vuls/id/258753 - US Government Resource | |
References | () http://www.securityfocus.com/archive/1/455200/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21723 - | |
References | () http://www.vupen.com/english/advisories/2006/5134 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-06-054.html - Patch, Vendor Advisory | |
References | () https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html - Patch |
Information
Published : 2006-12-27 01:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6425
Mitre link : CVE-2006-6425
CVE.ORG link : CVE-2006-6425
JSON object : View
Products Affected
novell
- netmail
CWE