Vulnerability Description
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Netmail | 3.5.2 |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454Patch
- http://secunia.com/advisories/23437ExploitPatchVendor Advisory
- http://securitytracker.com/id?1017437Patch
- http://www.kb.cert.org/vuls/id/863313US Government Resource
- http://www.securityfocus.com/bid/21728Patch
- http://www.vupen.com/english/advisories/2006/5134
- https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_PuPatch
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=454Patch
- http://secunia.com/advisories/23437ExploitPatchVendor Advisory
- http://securitytracker.com/id?1017437Patch
- http://www.kb.cert.org/vuls/id/863313US Government Resource
- http://www.securityfocus.com/bid/21728Patch
- http://www.vupen.com/english/advisories/2006/5134
- https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_PuPatch
FAQ
What is CVE-2006-6761?
CVE-2006-6761 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
How severe is CVE-2006-6761?
CVE-2006-6761 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6761?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Netmail.