---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Novell NetMail NMAP/IMAP Multiple Vulnerabilities SECUNIA ADVISORY ID: SA23437 VERIFY ADVISORY: http://secunia.com/advisories/23437/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Novell NetMail 3.x http://secunia.com/product/1530/ DESCRIPTION: Some vulnerabilities have been reported in Novell NetMail, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system and by malicious people to compromise a vulnerable system. 1) A boundary error within the NMAP (Network Messaging Application Protocol) service when handling STOR commands can be exploited to cause a buffer overflow by passing an overly long argument to the command. Successful exploitation requires a valid user account. 2) A boundary error in the IMAP service when handling the SUBSCRIBE command can be exploited to cause a buffer overflow. 3) An unspecified error in the IMAP service can be exploited to cause a DoS. Successful exploitation requires a valid user account. 4) An input validation error in the IMAP service when processing command continuation requests can be exploited to cause a heap-based buffer overflow. 5) A boundary error in the IMAP service when handling the APPEND command can be exploited to cause a stack-based buffer overflow by passing a specially crafted, overly long argument to the command. Successful exploitation requires a valid user account. The vulnerabilities are reported in version 3.5.2. Other versions may also be affected. SOLUTION: The vendor has issued beta patches. NetMail 3.52e FTF 2 for NetWare: http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974927.htm NetMail 3.52e FTF 2 for Windows: http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974928.htm NetMail 3.52e FTF 2 for Linux: http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974929.htm PROVIDED AND/OR DISCOVERED BY: 1-3) Dennis Rand 4-5) Discovered by an anonymous person and reported via ZDI. ORIGINAL ADVISORY: Novell: https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html https://secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.html ZDI: http://www.zerodayinitiative.com/advisories/ZDI-06-052.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------