CVE-2006-5478

Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html
http://secunia.com/advisories/22519 Patch Vendor Advisory
http://securitytracker.com/id?1017125
http://securitytracker.com/id?1017141
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm Patch
http://www.mnin.org/advisories/2006_novell_httpstk.pdf Vendor Advisory
http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401
http://www.securityfocus.com/archive/1/449899/100/0/threaded
http://www.securityfocus.com/archive/1/450017/100/0/threaded
http://www.securityfocus.com/archive/1/450520/100/100/threaded
http://www.securityfocus.com/bid/20655
http://www.securityfocus.com/bid/20853
http://www.vupen.com/english/advisories/2006/4141 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
http://www.zerodayinitiative.com/advisories/ZDI-06-036.html
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html
http://secunia.com/advisories/22519 Patch Vendor Advisory
http://securitytracker.com/id?1017125
http://securitytracker.com/id?1017141
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm Patch
http://www.mnin.org/advisories/2006_novell_httpstk.pdf Vendor Advisory
http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401
http://www.securityfocus.com/archive/1/449899/100/0/threaded
http://www.securityfocus.com/archive/1/450017/100/0/threaded
http://www.securityfocus.com/archive/1/450520/100/100/threaded
http://www.securityfocus.com/bid/20655
http://www.securityfocus.com/bid/20853
http://www.vupen.com/english/advisories/2006/4141 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
http://www.zerodayinitiative.com/advisories/ZDI-06-036.html
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:19

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html -
References () http://secunia.com/advisories/22519 - Patch, Vendor Advisory () http://secunia.com/advisories/22519 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1017125 - () http://securitytracker.com/id?1017125 -
References () http://securitytracker.com/id?1017141 - () http://securitytracker.com/id?1017141 -
References () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm - Patch () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm - Patch
References () http://www.mnin.org/advisories/2006_novell_httpstk.pdf - Vendor Advisory () http://www.mnin.org/advisories/2006_novell_httpstk.pdf - Vendor Advisory
References () http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401 - () http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401 -
References () http://www.securityfocus.com/archive/1/449899/100/0/threaded - () http://www.securityfocus.com/archive/1/449899/100/0/threaded -
References () http://www.securityfocus.com/archive/1/450017/100/0/threaded - () http://www.securityfocus.com/archive/1/450017/100/0/threaded -
References () http://www.securityfocus.com/archive/1/450520/100/100/threaded - () http://www.securityfocus.com/archive/1/450520/100/100/threaded -
References () http://www.securityfocus.com/bid/20655 - () http://www.securityfocus.com/bid/20655 -
References () http://www.securityfocus.com/bid/20853 - () http://www.securityfocus.com/bid/20853 -
References () http://www.vupen.com/english/advisories/2006/4141 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4141 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-06-035.html - () http://www.zerodayinitiative.com/advisories/ZDI-06-035.html -
References () http://www.zerodayinitiative.com/advisories/ZDI-06-036.html - () http://www.zerodayinitiative.com/advisories/ZDI-06-036.html -
References () https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html - () https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html -

Information

Published : 2006-10-24 20:07

Updated : 2024-11-21 00:19


NVD link : CVE-2006-5478

Mitre link : CVE-2006-5478

CVE.ORG link : CVE-2006-5478


JSON object : View

Products Affected

novell

  • edirectory
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer