CVE-2006-5478
Novell Edirectory - Memory Corruption
Title source: ruleDescription
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16773
exploitdb
WORKING POC
VERIFIED
by Expanders · cremotenovell
https://www.exploit-db.com/exploits/28836
exploitdb
WORKING POC
VERIFIED
by Manuel Santamarina Suarez · perlremotenovell
https://www.exploit-db.com/exploits/28835
metasploit
WORKING POC
GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/edirectory_host.rb
References (17)
Scores
EPSS
0.9129
EPSS Percentile
99.7%
Details
CWE
CWE-119
Status
published
Products (9)
novell/edirectory
8.0
novell/edirectory
8.5
novell/edirectory
8.5.12a
novell/edirectory
8.5.27
novell/edirectory
8.6.2
novell/edirectory
8.7
novell/edirectory
8.7.1 (2 CPE variants)
novell/edirectory
8.7.3
novell/edirectory
8.7.3.8_presp9
Published
Oct 24, 2006
Tracked Since
Feb 18, 2026