Vulnerability Name:

CVE-2006-6761 (CCN-31079)

Assigned:2006-12-22
Published:2006-12-22
Updated:2011-03-08
Summary:Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
This vulnerability is addressed in the following product update:
Novell, NetMail, 3.52e FTF2
CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
5.4 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
5.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-6761

Source: IDEFENSE
Type: Patch
20061223 Novell NetMail IMAPD subscribe Buffer Overflow Vulnerability

Source: CCN
Type: SA23437
Novell NetMail NMAP/IMAP Multiple Vulnerabilities

Source: SECUNIA
Type: Exploit, Patch, Vendor Advisory
23437

Source: CCN
Type: SECTRACK ID: 1017437
Novell NetMail Buffer Overflows in IMAP and NMAP Services Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1017437

Source: CCN
Type: US-CERT VU#863313
Novell NetMail IMAP vulnerable to buffer overflow when processing "SUBSCRIBE" commands

Source: CERT-VN
Type: US Government Resource
VU#863313

Source: CCN
Type: OSVDB ID: 31360
Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow

Source: BID
Type: Patch
21728

Source: CCN
Type: BID-21728
Novell Netmail IMAP SUBSCRIBE Buffer Overflow Vulnerability

Source: CCN
Type: BID-21773
Novell Netmail Multiple Services Unspecified Stack Buffer Overflow Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2006-5134

Source: XF
Type: UNKNOWN
netmail-subscribe-bo(31079)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 12.23.06
Novell NetMail IMAPD subscribe Buffer Overflow Vulnerability

Source: CCN
Type: Novell Security Alert 3717068
Security Vulnerabilities: NetMail Buffer Overrun and Denial of Service

Source: CONFIRM
Type: Patch
https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [12-23-2006]
Novell NetMail IMAP SUBSCRIBE Buffer Overflow

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netmail:3.5.2:a:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:b:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c1:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:d:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netmail:3.5.2:a:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:b:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c1:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:d:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netmail 3.5.2 a
    novell netmail 3.5.2 b
    novell netmail 3.5.2 c
    novell netmail 3.5.2 c1
    novell netmail 3.5.2 d
    novell netmail 3.5.2 e-ftfl
    novell netmail 3.5.2 a
    novell netmail 3.5.2 b
    novell netmail 3.5.2 c
    novell netmail 3.5.2 c1
    novell netmail 3.5.2 d