CVE-2006-2646
Summary
| CVE | CVE-2006-2646 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-05-30 10:02:00 UTC |
| Updated | 2016-10-18 03:39:00 UTC |
| Description | Buffer overflow in Alt-N MDaemon, possibly 9.0.1 and earlier, allows remote attackers to execute arbitrary code via a long A0001 argument that begins with a '"' (double quote). |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Alt-n | Mdaemon | 2.8 | All | All | All |
| Application | Alt-n | Mdaemon | 2.8.5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 3.0.3 | All | All | All |
| Application | Alt-n | Mdaemon | 3.0.4 | All | All | All |
| Application | Alt-n | Mdaemon | 3.1.1 | All | All | All |
| Application | Alt-n | Mdaemon | 3.1.2 | All | All | All |
| Application | Alt-n | Mdaemon | 3.1_beta | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.1 | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.4 | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.4 | All | pro | All |
| Application | Alt-n | Mdaemon | 3.5.4 | All | standard | All |
| Application | Alt-n | Mdaemon | 3.5.6 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0 | All | pro | All |
| Application | Alt-n | Mdaemon | 5.0.1 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.2 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.3 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.4 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.5 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.6 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.7 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0.5 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0.6 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0.7 | All | All | All |
| Application | Alt-n | Mdaemon | 6.5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 6.5.1 | All | All | All |
| Application | Alt-n | Mdaemon | 6.5.2 | All | All | All |
| Application | Alt-n | Mdaemon | 6.7.5 | All | All | All |
| Application | Alt-n | Mdaemon | 6.7.9 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.0 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.1 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.2 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.3 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.4 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.5 | All | All | All |
| Application | Alt-n | Mdaemon | 7.2 | All | All | All |
| Application | Alt-n | Mdaemon | 8.1.1 | All | All | All |
| Application | Alt-n | Mdaemon | 8.1.3 | All | All | All |
| Application | Alt-n | Mdaemon | 8.1.4 | All | All | All |
| Application | Alt-n | Mdaemon | 9.0.1 | All | All | All |
| Application | Alt-n | Mdaemon | 2.8 | All | All | All |
| Application | Alt-n | Mdaemon | 2.8.5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 3.0.3 | All | All | All |
| Application | Alt-n | Mdaemon | 3.0.4 | All | All | All |
| Application | Alt-n | Mdaemon | 3.1.1 | All | All | All |
| Application | Alt-n | Mdaemon | 3.1.2 | All | All | All |
| Application | Alt-n | Mdaemon | 3.1_beta | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.1 | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.4 | All | All | All |
| Application | Alt-n | Mdaemon | 3.5.4 | All | pro | All |
| Application | Alt-n | Mdaemon | 3.5.4 | All | standard | All |
| Application | Alt-n | Mdaemon | 3.5.6 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0 | All | pro | All |
| Application | Alt-n | Mdaemon | 5.0.1 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.2 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.3 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.4 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.5 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.6 | All | All | All |
| Application | Alt-n | Mdaemon | 5.0.7 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0.5 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0.6 | All | All | All |
| Application | Alt-n | Mdaemon | 6.0.7 | All | All | All |
| Application | Alt-n | Mdaemon | 6.5.0 | All | All | All |
| Application | Alt-n | Mdaemon | 6.5.1 | All | All | All |
| Application | Alt-n | Mdaemon | 6.5.2 | All | All | All |
| Application | Alt-n | Mdaemon | 6.7.5 | All | All | All |
| Application | Alt-n | Mdaemon | 6.7.9 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.0 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.1 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.2 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.3 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.4 | All | All | All |
| Application | Alt-n | Mdaemon | 6.8.5 | All | All | All |
| Application | Alt-n | Mdaemon | 7.2 | All | All | All |
| Application | Alt-n | Mdaemon | 8.1.1 | All | All | All |
| Application | Alt-n | Mdaemon | 8.1.3 | All | All | All |
| Application | Alt-n | Mdaemon | 8.1.4 | All | All | All |
| Application | Alt-n | Mdaemon | 9.0.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [Not a Vulnerability] MDaemon Heap Overflow in IMAP Service Lets Remote Authenticated Users Execute Arbitrary Code - SecurityTracker | SECTRACK | securitytracker.com | Exploit |
| '[Full-disclosure] *zeroday warez* MDAEMON LATEST VERSION PREAUTH' - MARC | FULLDISC | marc.info | |
| Alt-N MDaemon Remote Pre-Authentication IMAP Buffer Overflow Vulnerability | BID | www.securityfocus.com | Exploit |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.