First published: Sat Jul 09 2005(Updated: )
Novell NetMail automatically processes HTML in an attachment without prompting the user to save or open it, which makes it easier for remote attackers to conduct web-based attacks and steal cookies.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetMail | =3.5.2-c | |
Novell NetMail | =3.1 | |
Novell NetMail | =3.10-f | |
Novell NetMail | =3.0.1 | |
Novell NetMail | =3.10-g | |
Novell NetMail | =3.10-e | |
Novell NetMail | =3.5.2-b | |
Novell NetMail | =3.5.2-c1 | |
Novell NetMail | =3.10-h | |
Novell NetMail | =3.5.2-a | |
Novell NetMail | =3.10-b | |
Novell NetMail | =3.0.3a-a | |
Novell NetMail | =3.0.3a-b | |
Novell NetMail | =3.5.2-e-ftfl | |
Novell NetMail | =3.1-f | |
Novell NetMail | =3.10 | |
Novell NetMail | =3.10-c | |
Novell NetMail | =3.10-a | |
Novell NetMail | =3.10-d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2176 is classified as a moderate severity vulnerability.
To fix CVE-2005-2176, update to the latest version of Novell NetMail that addresses this vulnerability.
CVE-2005-2176 affects multiple versions of Novell NetMail including 3.1, 3.5.2, and 3.10.
Yes, CVE-2005-2176 can enable remote attackers to conduct web-based attacks without user interaction.
CVE-2005-2176 can be exploited to steal cookies and perform unauthorized actions on behalf of users.