Vulnerability Name:

CVE-2005-2176 (CCN-21313)

Assigned:2005-07-09
Published:2005-07-09
Updated:2011-03-08
Summary:Novell NetMail automatically processes HTML in an attachment without prompting the user to save or open it, which makes it easier for remote attackers to conduct web-based attacks and steal cookies.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2176

Source: CCN
Type: SA15778
Lotus Domino HTML Attachment Script Insertion Vulnerability

Source: CCN
Type: SA15962
Novell Netmail Script Insertion Vulnerability

Source: SECUNIA
Type: Vendor Advisory
15962

Source: CCN
Type: SECTRACK ID: 1014439
Novell NetMail HTML Attachment Processing Lets Remote Users Conduct Cross-Site Scripting Attacks

Source: SECTRACK
Type: UNKNOWN
1014439

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htm

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972433.htm

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972438.htm

Source: CCN
Type: Novell Web site
Novell NetMail 3.5 System Requirements

Source: OSVDB
Type: UNKNOWN
17821

Source: CCN
Type: OSVDB ID: 17821
Novell NetMail HTML File Attachment Arbitrary Script Insertion

Source: CCN
Type: BID-13926
Novell NetMail Multiple Remote Vulnerabilities

Source: BID
Type: Exploit
14171

Source: CCN
Type: BID-14171
Novell NetMail Automatic Script Execution Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2005-0994

Source: XF
Type: UNKNOWN
netmail-texthtml-xss(21313)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netmail:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.0.3a:a:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.0.3a:b:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.1:f:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:a:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:b:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c1:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:a:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:b:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:c:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:d:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:e:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:f:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:g:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:h:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netmail:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10b:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10c:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10d:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.0.3a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.0.3b:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10e:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10f:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10h:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2b:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2c:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2c1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.10:g:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netmail 3.0.1
    novell netmail 3.0.3a a
    novell netmail 3.0.3a b
    novell netmail 3.1
    novell netmail 3.1 f
    novell netmail 3.5.2 a
    novell netmail 3.5.2 b
    novell netmail 3.5.2 c
    novell netmail 3.5.2 c1
    novell netmail 3.5.2 e-ftfl
    novell netmail 3.10
    novell netmail 3.10 a
    novell netmail 3.10 b
    novell netmail 3.10 c
    novell netmail 3.10 d
    novell netmail 3.10 e
    novell netmail 3.10 f
    novell netmail 3.10 g
    novell netmail 3.10 h
    novell netmail 3.1
    novell netmail 3.10a
    novell netmail 3.10b
    novell netmail 3.10c
    novell netmail 3.10d
    novell netmail 3.0.1
    novell netmail 3.0.3a
    novell netmail 3.0.3b
    novell netmail 3.10
    novell netmail 3.10e
    novell netmail 3.10f
    novell netmail 3.10h
    novell netmail 3.5.2a
    novell netmail 3.5.2b
    novell netmail 3.5.2c
    novell netmail 3.5.2c1
    novell netmail 3.10 g