IMAP: IMAP Continuation Overflow

This signature detects attempts to exploit a known vulnerability against multiple IMAP service. Attackers can send a maliciously crafted request to execute arbitrary code on the affected host.

Extended Description

Novell NetMail is susceptible to a buffer overflow vulnerability in the IMAP command continuation function in the IMAP agent. This issue is due to a lack of proper boundary checks when copying user-supplied data to insufficiently-sized memory buffers. This vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected server process. This issue was originally documented in BID 13926 (Novell NetMail Multiple Remote Vulnerabilities).

Affected Products

Novell netmail

References

BugTraq: 14718

CVE: CVE-2005-1758

Short Name
IMAP:OVERFLOW:IMAP-CONT-OF
Severity
Minor
Recommended
False
Recommended Action
None
Category
IMAP
Keywords
CVE-2005-1758 Continuation IMAP Overflow bid:14718
Release Date
12/05/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3727
False Positive
Unknown
Vendors

Novell

CVSS Score

7.5

Found a potential security threat?