Novell

Netmail

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 13.54%
  • Veröffentlicht 10.12.2007 19:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple heap-based buffer overflows in avirus.exe in Novell NetMail 3.5.2 before Messaging Architects M+NetMail 3.52f (aka 3.5.2F) allows remote attackers to execute arbitrary code via unspecified ASCII integers used as memory allocation arguments, ...

  • EPSS 49.13%
  • Veröffentlicht 11.05.2007 16:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the SSL version of the NMDMC.EXE service in Novell NetMail 3.52e FTF2 and probably earlier allows remote attackers to execute arbitrary code via a crafted request.

  • EPSS 66.98%
  • Veröffentlicht 08.03.2007 22:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in webadmin.exe in Novell NetMail 3.5.2 allows remote attackers to execute arbitrary code via a long username during HTTP Basic authentication.

  • EPSS 1.15%
  • Veröffentlicht 27.12.2006 02:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.

Exploit
  • EPSS 53.6%
  • Veröffentlicht 27.12.2006 02:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.

  • EPSS 76.47%
  • Veröffentlicht 27.12.2006 01:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.

  • EPSS 64.13%
  • Veröffentlicht 27.12.2006 01:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (...

  • EPSS 0.07%
  • Veröffentlicht 31.12.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Novell NetMail 3.5.2a, 3.5.2b, and 3.5.2c, when running on Linux, sets the owner and group ID to 500 for certain files, which could allow users or groups with that ID to execute arbitrary code or cause a denial of service by modifying those files.

  • EPSS 83.42%
  • Veröffentlicht 18.11.2005 22:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Stack-based buffer overflow in the IMAP daemon in Novell Netmail 3.5.2 allows remote attackers to execute arbitrary code via "long verb arguments."

  • EPSS 0.14%
  • Veröffentlicht 20.10.2005 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Stack-based buffer overflow in the NMAP Agent for Novell NetMail 3.52C and possibly earlier versions allows local users to execute arbitrary code via a long user name in the USER command.