IMAP: Username Buffer Overflow
This protocol anomaly triggers when it detects an IMAP user name that is too long. This can indicate a buffer overflow attempt.
Extended Description
Novell NetMail is susceptible to a buffer overflow vulnerability in the IMAP command continuation function in the IMAP agent. This issue is due to a lack of proper boundary checks when copying user-supplied data to insufficiently-sized memory buffers. This vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected server process. This issue was originally documented in BID 13926 (Novell NetMail Multiple Remote Vulnerabilities).
Affected Products
Novell netmail
References
BugTraq: 14718
CVE: CVE-2005-1255
URL: http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc2060.html http://seclists.org/lists/bugtraq/1997/Mar/0001.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Novell
7.5
10.0