Vulnerability Name:

CVE-2006-5478 (CCN-29772)

Assigned:2006-10-20
Published:2006-10-20
Updated:2018-10-17
Summary:Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Fri Oct 20 2006 - 19:23:44 CDT
Hustle Labs & MNIN eDirectory Vulnerability

Source: MITRE
Type: CNA
CVE-2006-5478

Source: FULLDISC
Type: UNKNOWN
20061028 ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability

Source: FULLDISC
Type: UNKNOWN
20061028 ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability

Source: CCN
Type: SA22519
Novell Products Two Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
22519

Source: CCN
Type: SECTRACK ID: 1017125
Novell eDirectory BuildRedirectURL() Buffer Overflow Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1017125

Source: CCN
Type: SECTRACK ID: 1017141
Novell NetMail Buffer Overflow in Username Authentication Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1017141

Source: CCN
Type: Novell Technical Information Document TID2974603
eDirectory Post 8.7.3.8 FTF1 HTTPSTK

Source: CONFIRM
Type: Patch
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm

Source: CCN
Type: Novell eDirectory/iMonitor Remote Code Execution Security Advisory
Novell eDirectory Remote Code Exec Stack Overflow

Source: MISC
Type: Vendor Advisory
http://www.mnin.org/advisories/2006_novell_httpstk.pdf

Source: CCN
Type: Novell, Inc. Web site
eDirectory

Source: CONFIRM
Type: UNKNOWN
http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3723994&sliceId=SAL_Public&dialogID=16776123&stateId=1%200%202648401

Source: BUGTRAQ
Type: UNKNOWN
20061026 ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20061028 Re: [Full-disclosure] ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20061103 ZDI-06-036: Novell Netmail User Authentication Buffer Overflow Vulnerability

Source: BID
Type: UNKNOWN
20655

Source: CCN
Type: BID-20655
Novell eDirectory iMonitor HTTPSTK Buffer Overflow Vulnerability

Source: BID
Type: UNKNOWN
20853

Source: CCN
Type: BID-20853
Novell Netmail Authentication Buffer Overflow Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2006-4141

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-06-036.html

Source: XF
Type: UNKNOWN
novell-edirectory-httpstk-bo(29772)

Source: CONFIRM
Type: UNKNOWN
https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [10-21-2006]
Novell eDirectory NDS Server Host Header Overflow

Source: CCN
Type: ZDI-06-035
Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:edirectory:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2006-5478 (CCN-30056)

    Assigned:2006-10-31
    Published:2006-10-31
    Updated:2006-10-31
    Summary:Novell NetMail is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the user authentication component. By sending a specially-crafted username containing multiple period (.) characters, a remote attacker could overflow a buffer and execute arbitrary code on the system.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2006-5478

    Source: CCN
    Type: SA22519
    Novell Products Two Buffer Overflow Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1017125
    Novell eDirectory BuildRedirectURL() Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: SECTRACK ID: 1017141
    Novell NetMail Buffer Overflow in Username Authentication Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Novell NetMail Web site
    Novell NetMail 3.5 System Requirements

    Source: CCN
    Type: Novell Technical Information Document 3723994
    Security Vulnerability: Remote code Execution in iMonitor and NetMail

    Source: CCN
    Type: BID-20655
    Novell eDirectory iMonitor HTTPSTK Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-20853
    Novell Netmail Authentication Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    netmail-authentication-bo(30056)

    Source: CCN
    Type: ZDI-06-036
    Novell Netmail User Authentication Buffer Overflow Vulnerability

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:novell:edirectory:8.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.5.27:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell edirectory 8.0
    novell edirectory 8.5
    novell edirectory 8.5.12a
    novell edirectory 8.5.27
    novell edirectory 8.6.2
    novell edirectory 8.7
    novell edirectory 8.7.1
    novell edirectory 8.7.1 sp1
    novell edirectory 8.7.3
    novell edirectory 8.7.3.8_presp9
    novell edirectory 8.6.2
    novell edirectory 8.7
    novell edirectory 8.7.3
    novell edirectory 8.7.3.8
    novell edirectory 8.0
    novell edirectory 8.5
    novell edirectory 8.5.12a
    novell edirectory 8.5.27
    novell edirectory 8.7.1
    novell edirectory 8.7.1 sp1
    novell edirectory 8.6.2
    novell edirectory 8.7
    novell edirectory 8.7.3
    novell edirectory 8.7.3.8
    novell edirectory 8.0
    novell edirectory 8.5
    novell edirectory 8.5.12a
    novell edirectory 8.5.27
    novell edirectory 8.7.1
    novell edirectory 8.7.1 sp1