CVE-2006-5478
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
24/10/2006
Last modified:
09/04/2025
Description
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html
- http://secunia.com/advisories/22519
- http://securitytracker.com/id?1017125=
- http://securitytracker.com/id?1017141=
- http://support.novell.com/cgi-bin/search/searchtid.cgi?%2F2974600_htm=
- http://www.mnin.org/advisories/2006_novell_httpstk.pdf
- http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401
- http://www.securityfocus.com/archive/1/449899/100/0/threaded
- http://www.securityfocus.com/archive/1/450017/100/0/threaded
- http://www.securityfocus.com/archive/1/450520/100/100/threaded
- http://www.securityfocus.com/bid/20655
- http://www.securityfocus.com/bid/20853
- http://www.vupen.com/english/advisories/2006/4141
- http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-036.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html
- http://secunia.com/advisories/22519
- http://securitytracker.com/id?1017125=
- http://securitytracker.com/id?1017141=
- http://support.novell.com/cgi-bin/search/searchtid.cgi?%2F2974600_htm=
- http://www.mnin.org/advisories/2006_novell_httpstk.pdf
- http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401
- http://www.securityfocus.com/archive/1/449899/100/0/threaded
- http://www.securityfocus.com/archive/1/450017/100/0/threaded
- http://www.securityfocus.com/archive/1/450520/100/100/threaded
- http://www.securityfocus.com/bid/20655
- http://www.securityfocus.com/bid/20853
- http://www.vupen.com/english/advisories/2006/4141
- http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-036.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html



