|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> Novell NetMail IMAP Agent Long Verb Arguments Buffer Overflow Vulnerability Vulnerability Assessment Details
|
Novell NetMail IMAP Agent Long Verb Arguments Buffer Overflow Vulnerability |
||
Checks for long verb arguments buffer overflow vulnerability in Novell NetMail's IMAP agent Detailed Explanation for this Vulnerability Assessment Summary : The remote IMAP server is affected by a buffer overflow vulnerability. Description : The remote host is running Novell NetMail, a messaging and calendaring system for Windows, Linux, Unix, and Netware. The IMAP agent installed on the remote host as part of Novell NetMail is affected by a stack-based buffer overflow due to its improper handling of long arguments to selected IMAP commands while in an authenticated state. Successful exploitation of this issue may lead to the execution of arbitrary code on the remote host. See also : http://www.zerodayinitiative.com/advisories/ZDI-05-003.html http://support.novell.com/filefinder/19357/beta.html Solution : Upgrade to NetMail 3.52E FTF (Field Test File) 1 or later. Network Security Threat Level: High / CVSS Base Score : 7.0 (AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N) Networks Security ID: 15491 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |