Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-2551Improper Restriction of Operations within the Bounds of a Memory Buffer in Edirectory

5 documents4 sources
Severity
7.5HIGHNVD
EPSS
71.8%
top 1.26%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 12
Latest updateMay 1

Description

Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q65f-qmjg-ghp4: Buffer overflow in dhost2022-05-01
CVEList
CVE-2005-2551: Buffer overflow in dhost2005-08-12

💥Exploits & PoCs

2
Exploit-DB
eDirectory 8.7.3 - iMonitor Remote Stack Buffer Overflow (Metasploit)2010-07-13
Exploit-DB
Novell eDirectory 8.7.3 - iMonitor Remote Stack Overflow (Metasploit)2005-08-12
CVE-2005-2551 — Novell Edirectory vulnerability | cvebase