Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:EXPLOIT:NETMAIL-APPEND

Severity

High

Recommended

No

Recommended Action

Drop

Category

IMAP

Keywords

Novell NetMail IMAP APPEND

Release Date

2007/01/12

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: Novell NetMail IMAP APPEND


This signature detects attempts to exploit a known vulnerability in the Novell NetMail IMAP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Novell Netmail is prone to a remotely exploitable denial-of-service vulnerability. A malformed IMAP APPEND argument can trigger this issue. A successful exploit could let an authenticated remote attacker crash the affected server.

Affected Products

  • Novell NetMail 3.52.0
  • Novell NetMail 3.52.0 A
  • Novell NetMail 3.52.0 B
  • Novell NetMail 3.52.0 C
  • Novell NetMail 3.52.0 C1
  • Novell NetMail 3.52.0 D

References

  • BugTraq: 21729
  • CVE: CVE-2006-6425
  • URL: http://www.securityfocus.com/archive/1/archive/1/455200/100/0/threaded

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out