Novell eDirectory HTTP Server Redirection Buffer Overflow
Publish Date: 21 juillet 2015
Gravité: : Élevé
Identifiant(s) CVE: : CVE-2006-5478
Date du conseil: 21 juillet 2015
Description
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Information Exposure Rating:
Apply associated Trend Micro DPI Rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1000833
Trend Micro Deep Security DPI Rule Name: 1000833 - Novell eDirectory HTTP Server Redirection Buffer Overflow
Affected software and version:
- Novell eDirectory 8.0
- Novell eDirectory 8.5
- Novell eDirectory 8.5.12 a
- Novell eDirectory 8.5.27
- Novell eDirectory 8.6.2
- Novell eDirectory 8.7
- Novell eDirectory 8.7.1
- Novell eDirectory 8.7.1 SU1
- Novell eDirectory 8.7.3
- Novell eDirectory 8.7.3 8 pre-SP9