Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-5478Improper Restriction of Operations within the Bounds of a Memory Buffer in Edirectory

Severity
7.5HIGHNVD
EPSS
91.3%
top 0.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 24
Latest updateMay 1

Description

Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

NVDnovell/edirectory9 versions+8

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7fwm-92mv-mh6q: Multiple stack-based buffer overflows in Novell eDirectory 82022-05-01
CVEList
CVE-2006-5478: Multiple stack-based buffer overflows in Novell eDirectory 82006-10-24

💥Exploits & PoCs

4
Exploit-DB
Novell eDirectory NDS Server - Host Header Overflow (Metasploit)2010-05-09
Exploit-DB
Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (3)2006-10-30
Exploit-DB
Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2)2006-10-30
Exploit-DB
Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (1)2006-10-21
CVE-2006-5478 — Novell Edirectory vulnerability | cvebase