IMAP: Username Buffer Overflow

This protocol anomaly triggers when it detects an IMAP user name that is too long. This can indicate a buffer overflow attempt.

Extended Description

Novell NetMail is susceptible to a buffer overflow vulnerability in the IMAP command continuation function in the IMAP agent. This issue is due to a lack of proper boundary checks when copying user-supplied data to insufficiently-sized memory buffers. This vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected server process. This issue was originally documented in BID 13926 (Novell NetMail Multiple Remote Vulnerabilities).

Affected Products

Novell netmail

Short Name
IMAP:OVERFLOW:USER
Severity
Major
Recommended
True
Recommended Action
Drop
Category
IMAP
Keywords
CVE-2004-1011 CVE-2004-1067 CVE-2005-1255 CVE-2005-1758 bid:14718
Release Date
08/27/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Novell

CVSS Score

7.5

10.0

Found a potential security threat?