{"vuid":"VU#919369","idnumber":"919369","name":"Novell Netmail WebAdmin buffer overflow vulnerability","keywords":["Novell Netmail WebAdmin","buffer overflow","sprint() call","webadmin.exe","TCP port 89"],"overview":"Novell NetMail contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.","clean_desc":"Novell NetMail is an email and messenging software package developed by Novell. It is designed to offer mail and calendaring services to large groups of users. WebAdmin is a browser based administrative tool used to manage NetMail. WebAdmin (webadmin.exe) contains a buffer overflow vulnerability. An attacker may be able to trigger the overflow by sending an oversized username to the WebAdmin interface on a vulnerable system.","impact":"A remote, unathenticated attacker may be able to execute arbitrary code.","resolution":"Update\nNovell has released NetMail 3.52e to address this issue.","workarounds":"Restrict access Restricting access to port 89/tcp and 449/tcp to trusted hosts may mitigate this vulnerability.","sysaffected":"","thanks":"Thanks to the Zero Day Initiative for providing information about this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://download.novell.com/Download?buildid=sMYRODW09pw","http://www.novell.com/products/netmail/","http://www.novell.com/documentation/netmail35/index.html?page=/documentation/netmail35/netmail35/data/bou06jd.html","http://www.zerodayinitiative.com/advisories/ZDI-07-009.html","http://secunia.com/advisories/24445/","http://www.ciac.org/ciac/bulletins/r-173.shtml","http://www.securityfocus.com/bid/22857","http://securitytracker.com/id?1017734"],"cveids":["CVE-2007-1350"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-03-07T20:02:55Z","publicdate":"2007-03-07T00:00:00Z","datefirstpublished":"2007-03-08T12:40:31Z","dateupdated":"2007-03-19T18:16:52Z","revision":20,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"19","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"5","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"3.0375","cam_scorecurrentwidelyknown":"3.15","cam_scorecurrentwidelyknownexploited":"5.4","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.0375,"vulnote":null}