Lucene search

K
certCERTVU:919369
HistoryMar 08, 2007 - 12:00 a.m.

Novell Netmail WebAdmin buffer overflow vulnerability

2007-03-0800:00:00
www.kb.cert.org
16

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.942

Percentile

99.2%

Overview

Novell NetMail contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.

Description

Novell NetMail is an email and messenging software package developed by Novell. It is designed to offer mail and calendaring services to large groups of users.

WebAdmin is a browser based administrative tool used to manage NetMail. WebAdmin (webadmin.exe) contains a buffer overflow vulnerability. An attacker may be able to trigger the overflow by sending an oversized username to the WebAdmin interface on a vulnerable system.


Impact

A remote, unathenticated attacker may be able to execute arbitrary code.


Solution

Update
Novell has released NetMail 3.52e to address this issue.


Restrict access

Restricting access to port 89/tcp and 449/tcp to trusted hosts may mitigate this vulnerability.


Vendor Information

919369

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Novell, Inc. __ Affected

Updated: March 08, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://download.novell.com/Download?buildid=sMYRODW09pw&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23919369 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to the Zero Day Initiative for providing information about this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-1350
Severity Metric: 3.04 Date Public:

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.942

Percentile

99.2%