Novell NetMail IMAP Agent Long Verb Arguments Remote Overflow

high Nessus Plugin ID 20318

Synopsis

The remote IMAP server is affected by a buffer overflow vulnerability.

Description

The remote host is running Novell NetMail, a messaging and calendaring system for Windows, Linux, Unix, and NetWare.

The IMAP agent installed on the remote host as part of Novell NetMail is affected by a stack-based buffer overflow due to its improper handling of long arguments to selected IMAP commands while in an authenticated state. Successful exploitation of this issue may lead to the execution of arbitrary code on the remote host.

Solution

Upgrade to NetMail 3.52E FTF (Field Test File) 1 or later.

See Also

https://www.zerodayinitiative.com/advisories/published/

http://www.nessus.org/u?76172f4b

Plugin Details

Severity: High

ID: 20318

File Name: novell_netmail_imapd_long_args_overflows.nasl

Version: 1.19

Type: remote

Published: 12/16/2005

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/17/2005

Vulnerability Publication Date: 11/18/2005

Exploitable With

Metasploit (Novell NetMail IMAP STATUS Buffer Overflow)

Reference Information

CVE: CVE-2005-3314

BID: 15491