7.5
CVE-2006-5478
- EPSS 90.7%
- Veröffentlicht 24.10.2006 20:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Novell ≫ Edirectory Version8.0
Novell ≫ Edirectory Version8.5
Novell ≫ Edirectory Version8.5.12a
Novell ≫ Edirectory Version8.5.27
Novell ≫ Edirectory Version8.6.2
Novell ≫ Edirectory Version8.7
Novell ≫ Edirectory Version8.7.1
Novell ≫ Edirectory Version8.7.1 Updatesp1
Novell ≫ Edirectory Version8.7.3
Novell ≫ Edirectory Version8.7.3.8_presp9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 90.7% | 0.996 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.