Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow. Successful exploitation requires a valid user account.
This vulnerability is addressed in the following product update:
Novell, NetMail, 3.52e FTF2
Publication date: Wed, 27 Dec 2006 07:28:00 +0000