7.5
CVSSv2

CVE-2006-5478

Published: 24/10/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in Novell eDirectory 8.8.x prior to 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail prior to 3.52e FTF2, allow remote malicious users to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.

Vulnerable Product Search on Vulmon Subscribe to Product

novell edirectory 8.5.27

novell edirectory 8.6.2

novell edirectory 8.7

novell edirectory 8.7.1

novell edirectory 8.0

novell edirectory 8.7.3

novell edirectory 8.5

novell edirectory 8.5.12a

novell edirectory 8.7.3.8_presp9

Exploits

source: wwwsecurityfocuscom/bid/20655/info The Novell eDirectory server iMonitor is prone to a stack-based buffer-overflow vulnerability because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer An attacker could leverage this issue to execute arbitrary code with administrative privileg ...
source: wwwsecurityfocuscom/bid/20655/info The Novell eDirectory server iMonitor is prone to a stack-based buffer-overflow vulnerability because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer An attacker could leverage this issue to execute arbitrary code with administrative priv ...
source: wwwsecurityfocuscom/bid/20655/info The Novell eDirectory server iMonitor is prone to a stack-based buffer-overflow vulnerability because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer An attacker could leverage this issue to execute arbitrary code with administrative privil ...
## # $Id: edirectory_hostrb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...