7.5
CVE-2006-5478
- EPSS 90.7%
- Published 24.10.2006 20:07:00
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Data is provided by the National Vulnerability Database (NVD)
Novell ≫ Edirectory Version8.0
Novell ≫ Edirectory Version8.5
Novell ≫ Edirectory Version8.5.12a
Novell ≫ Edirectory Version8.5.27
Novell ≫ Edirectory Version8.6.2
Novell ≫ Edirectory Version8.7
Novell ≫ Edirectory Version8.7.1
Novell ≫ Edirectory Version8.7.1 Updatesp1
Novell ≫ Edirectory Version8.7.3
Novell ≫ Edirectory Version8.7.3.8_presp9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 90.7% | 0.996 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.