Short Name |
IMAP:OVERFLOW:IMAP-CONT-OF |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
IMAP |
Keywords |
IMAP Continuation Overflow |
Release Date |
2005/12/05 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against multiple IMAP service. Attackers can send a maliciously crafted request to execute arbitrary code on the affected host.
Novell NetMail is susceptible to a buffer overflow vulnerability in the IMAP command continuation function in the IMAP agent. This issue is due to a lack of proper boundary checks when copying user-supplied data to insufficiently-sized memory buffers. This vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected server process. This issue was originally documented in BID 13926 (Novell NetMail Multiple Remote Vulnerabilities).