Vulnerability Name:

CVE-2005-3314 (CCN-23114)

Assigned:2005-11-18
Published:2005-11-18
Updated:2017-07-11
Summary:Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via "long verb arguments."
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2005-3314

Source: CCN
Type: SA17641
Novell NetMail IMAP Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
17641

Source: CCN
Type: SECTRACK ID: 1015240
Novell NetMail Buffer Overflows in IMAP Service May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1015240

Source: CCN
Type: Novell Technical Information Document - TID2972665
NetMail 3.52e FTF 1 for Linux

Source: CONFIRM
Type: Patch
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972665.htm

Source: CCN
Type: Novell Technical Information Document - TID2972672
NetMail 3.52e FTF 1 for NetWare

Source: CONFIRM
Type: Patch
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972672.htm

Source: CCN
Type: Novell Technical Information Document - TID2972673
NetMail 3.52e FTF 1 for Windows

Source: CONFIRM
Type: Patch
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972673.htm

Source: OSVDB
Type: UNKNOWN
20956

Source: CCN
Type: OSVDB ID: 20956
Novell NetMail IMAP Service Verb Argument Remote Overflow

Source: BID
Type: UNKNOWN
15491

Source: CCN
Type: BID-15491
Novell NetMail IMAP Unspecified Buffer Overflow Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2005-2494

Source: MISC
Type: Patch, Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-05-003.html

Source: XF
Type: UNKNOWN
netmail-imap-multiple-bo(23114)

Source: XF
Type: UNKNOWN
netmail-imap-multiple-bo(23114)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netmail:3.52d:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netmail 3.5.2 e-ftfl
    novell netmail 3.52d