CVE-2006-6761

Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:netmail:3.5.2:a:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.5.2:b:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.5.2:c1:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.5.2:d:*:*:*:*:*:*
cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454 - Patch () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454 - Patch
References () http://secunia.com/advisories/23437 - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/23437 - Exploit, Patch, Vendor Advisory
References () http://securitytracker.com/id?1017437 - Patch () http://securitytracker.com/id?1017437 - Patch
References () http://www.kb.cert.org/vuls/id/863313 - US Government Resource () http://www.kb.cert.org/vuls/id/863313 - US Government Resource
References () http://www.securityfocus.com/bid/21728 - Patch () http://www.securityfocus.com/bid/21728 - Patch
References () http://www.vupen.com/english/advisories/2006/5134 - () http://www.vupen.com/english/advisories/2006/5134 -
References () https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html - Patch () https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html - Patch

Information

Published : 2006-12-27 02:28

Updated : 2024-11-21 00:23


NVD link : CVE-2006-6761

Mitre link : CVE-2006-6761

CVE.ORG link : CVE-2006-6761


JSON object : View

Products Affected

novell

  • netmail