Multiple stack-based buffer overflows in Novell eDirectory 8.8.x prior to 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail prior to 3.52e FTF2, allow remote malicious users to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
novell edirectory 8.5.27 |
||
novell edirectory 8.6.2 |
||
novell edirectory 8.7 |
||
novell edirectory 8.7.1 |
||
novell edirectory 8.0 |
||
novell edirectory 8.7.3 |
||
novell edirectory 8.5 |
||
novell edirectory 8.5.12a |
||
novell edirectory 8.7.3.8_presp9 |