CVE-2006-5478

Novell Edirectory - Memory Corruption

Title source: rule

Description

Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16773
exploitdb WORKING POC VERIFIED
by MC · rubyremotenovell
https://www.exploit-db.com/exploits/28837
exploitdb WORKING POC VERIFIED
by Expanders · cremotenovell
https://www.exploit-db.com/exploits/28836
exploitdb WORKING POC VERIFIED
by Manuel Santamarina Suarez · perlremotenovell
https://www.exploit-db.com/exploits/28835
metasploit WORKING POC GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/edirectory_host.rb

Scores

EPSS 0.9129
EPSS Percentile 99.7%

Details

CWE
CWE-119
Status published
Products (9)
novell/edirectory 8.0
novell/edirectory 8.5
novell/edirectory 8.5.12a
novell/edirectory 8.5.27
novell/edirectory 8.6.2
novell/edirectory 8.7
novell/edirectory 8.7.1 (2 CPE variants)
novell/edirectory 8.7.3
novell/edirectory 8.7.3.8_presp9
Published Oct 24, 2006
Tracked Since Feb 18, 2026