Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-6424


Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow.


Published

2006-12-27T01:28:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application novell netmail ≤ 3.5.2 Yes
Application novell netmail 3.0.1 Yes
Application novell netmail 3.0.3a Yes
Application novell netmail 3.0.3a Yes
Application novell netmail 3.1 Yes
Application novell netmail 3.1 Yes
Application novell netmail 3.5 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes
Application novell netmail 3.10 Yes

References