| Vulnerability Name: | CVE-2005-2469 (CCN-22727) | ||||||||
| Assigned: | 2005-10-12 | ||||||||
| Published: | 2005-10-12 | ||||||||
| Updated: | 2017-07-11 | ||||||||
| Summary: | Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command. | ||||||||
| CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||
| References: | Source: FULLDISC Type: UNKNOWN 20051012 Secunia Research: Novell NetMail NMAP Agent "USER" Buffer Overflow Vulnerability Source: MITRE Type: CNA CVE-2005-2469 Source: CCN Type: SA15925 Novell NetMail NMAP Agent "USER" Buffer Overflow Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 15925 Source: MISC Type: Patch, Vendor Advisory http://secunia.com/secunia_research/2005-23/advisory/ Source: CCN Type: SECTRACK ID: 1015048 Novell NetMail Buffer Overflow in Network Messaging Application Protocol Agent Lets Remote Authenticated Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015048 Source: CONFIRM Type: Patch http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htm Source: CONFIRM Type: Patch http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972433.htm Source: CONFIRM Type: Patch http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972438.htm Source: CCN Type: Novell NetMail Web site Novell NetMail 3.5 System Requirements Source: OSVDB Type: UNKNOWN 19916 Source: CCN Type: OSVDB ID: 19916 Novell NetMail NMAP Agent USER Command Overflow Source: BID Type: UNKNOWN 15080 Source: CCN Type: BID-15080 Novell NetMail NMAP Agent Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN netmail-nmap-user-bo(22727) Source: XF Type: UNKNOWN netmail-nmap-user-bo(22727) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||