---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Novell Netmail WebAdmin Long Username Buffer Overflow SECUNIA ADVISORY ID: SA24445 VERIFY ADVISORY: http://secunia.com/advisories/24445/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Novell NetMail 3.x http://secunia.com/product/1530/ DESCRIPTION: A vulnerability has been reported in Novell Netmail, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within WEBADMIN.EXE when performing HTTP Basic authentication. This can be exploited to cause a stack-based buffer overflow via a specially crafted packet with an overly long (greater than 213 bytes) username string sent to default port 89/TCP. Successful exploitation allows execution of arbitrary code. The vulnerability is reported in version 3.5.2. Other versions may also be affected. SOLUTION: Apply NetMail 3.52E Update. PROVIDED AND/OR DISCOVERED BY: Discovered by an anonymous researcher and reported via ZDI. ORIGINAL ADVISORY: Novell: http://download.novell.com/Download?buildid=sMYRODW09pw ZDI: http://www.zerodayinitiative.com/advisories/ZDI-07-009.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------