Vulnerability Details : CVE-2006-5478
Public exploit exists!
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-5478
- cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5478
91.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-5478
-
Novell eDirectory NDS Server Host Header Overflow
Disclosure Date: 2006-10-21First seen: 2020-04-26exploit/windows/http/edirectory_hostThis module exploits a stack buffer overflow in Novell eDirectory 8.8.1. The web interface does not validate the length of the HTTP Host header prior to using the value of that header in an HTTP redirect. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2006-5478
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-5478
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-5478
-
http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html
-
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html
-
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm
Patch
-
http://www.securityfocus.com/archive/1/450520/100/100/threaded
-
http://www.zerodayinitiative.com/advisories/ZDI-06-036.html
-
http://www.securityfocus.com/bid/20655
Novell eDirectory iMonitor HTTPSTK Buffer Overflow Vulnerability
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html
-
http://securitytracker.com/id?1017141
-
http://www.securityfocus.com/archive/1/449899/100/0/threaded
-
http://www.securityfocus.com/archive/1/450017/100/0/threaded
-
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
-
http://securitytracker.com/id?1017125
-
http://www.mnin.org/advisories/2006_novell_httpstk.pdf
Vendor Advisory
-
http://www.securityfocus.com/bid/20853
-
http://www.vupen.com/english/advisories/2006/4141
Vendor Advisory
Jump to