Vulnerability Name:

CVE-2006-6762 (CCN-31067)

Assigned:2006-12-22
Published:2006-12-22
Updated:2011-03-08
Summary:The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
This vulnerability is addressed in the following product update:
Novell, NetMail, 3.52e FTF2
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2006-6762

Source: IDEFENSE
Type: Patch
20061223 Novell Netmail IMAP append Denial of Service Vulnerability

Source: CCN
Type: SA23437
Novell NetMail NMAP/IMAP Multiple Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
23437

Source: CCN
Type: US-CERT VU#944273
Novell NetMail IMAP vulnerable to DoS when processing "APPEND" commands

Source: CERT-VN
Type: US Government Resource
VU#944273

Source: CCN
Type: OSVDB ID: 31361
Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS

Source: BID
Type: Patch
21729

Source: CCN
Type: BID-21729
Novell Netmail IMAP APPEND Denial of Service Vulnerability

Source: CCN
Type: BID-21773
Novell Netmail Multiple Services Unspecified Stack Buffer Overflow Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2006-5134

Source: XF
Type: UNKNOWN
netmail-append-dos(31067)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 12.23.06
Novell Netmail IMAP append Denial of Service Vulnerability

Source: CCN
Type: Novell Security Alert 3717068
Security Vulnerabilities: NetMail Buffer Overrun and Denial of Service

Source: CONFIRM
Type: Patch
https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netmail:3.5.2:a:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:b:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:c1:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:d:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netmail:3.5.2a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2b:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2c:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2c1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netmail:3.5.2d:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netmail 3.5.2 a
    novell netmail 3.5.2 b
    novell netmail 3.5.2 c
    novell netmail 3.5.2 c1
    novell netmail 3.5.2 d
    novell netmail 3.5.2 e-ftfl
    novell netmail 3.5.2a
    novell netmail 3.5.2b
    novell netmail 3.5.2c
    novell netmail 3.5.2c1
    novell netmail 3.5.2d