Unrated severityNVD Advisory· Published Dec 27, 2006· Updated Apr 23, 2026
CVE-2006-6761
CVE-2006-6761
Description
Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
Affected products
6cpe:2.3:a:novell:netmail:3.5.2:a:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:novell:netmail:3.5.2:a:*:*:*:*:*:*
- cpe:2.3:a:novell:netmail:3.5.2:b:*:*:*:*:*:*
- cpe:2.3:a:novell:netmail:3.5.2:c:*:*:*:*:*:*
- cpe:2.3:a:novell:netmail:3.5.2:c1:*:*:*:*:*:*
- cpe:2.3:a:novell:netmail:3.5.2:d:*:*:*:*:*:*
- cpe:2.3:a:novell:netmail:3.5.2:e-ftfl:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- labs.idefense.com/intelligence/vulnerabilities/display.phpnvdPatch
- securitytracker.com/idnvdPatch
- www.securityfocus.com/bid/21728nvdPatch
- secure-support.novell.com/KanisaPlatform/Publishing/328/3717068_f.SAL_Public.htmlnvdPatch
- secunia.com/advisories/23437nvdExploitPatchVendor Advisory
- www.kb.cert.org/vuls/id/863313nvdUS Government Resource
- www.vupen.com/english/advisories/2006/5134nvd
News mentions
0No linked articles in our index yet.