Short Name |
IMAP:OVERFLOW:USER |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
IMAP |
Release Date |
2003/08/27 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly triggers when it detects an IMAP user name that is too long. This can indicate a buffer overflow attempt.
Novell NetMail is susceptible to a buffer overflow vulnerability in the IMAP command continuation function in the IMAP agent. This issue is due to a lack of proper boundary checks when copying user-supplied data to insufficiently-sized memory buffers. This vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected server process. This issue was originally documented in BID 13926 (Novell NetMail Multiple Remote Vulnerabilities).