Vulnerability Description
Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Netmail | 3.5.2 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0299.html
- http://secunia.com/advisories/15925/PatchVendor Advisory
- http://secunia.com/secunia_research/2005-23/advisory/PatchVendor Advisory
- http://securitytracker.com/id?1015048
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htmPatch
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972433.htmPatch
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972438.htmPatch
- http://www.osvdb.org/19916
- http://www.securityfocus.com/bid/15080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22727
- http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0299.html
- http://secunia.com/advisories/15925/PatchVendor Advisory
- http://secunia.com/secunia_research/2005-23/advisory/PatchVendor Advisory
- http://securitytracker.com/id?1015048
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972340.htmPatch
FAQ
What is CVE-2005-2469?
CVE-2005-2469 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command.
How severe is CVE-2005-2469?
CVE-2005-2469 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2469?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Netmail.