Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
2006-10-24T20:07:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | novell | edirectory | 8.0 | Yes |
Application | novell | edirectory | 8.5 | Yes |
Application | novell | edirectory | 8.5.12a | Yes |
Application | novell | edirectory | 8.5.27 | Yes |
Application | novell | edirectory | 8.6.2 | Yes |
Application | novell | edirectory | 8.7 | Yes |
Application | novell | edirectory | 8.7.1 | Yes |
Application | novell | edirectory | 8.7.1 | Yes |
Application | novell | edirectory | 8.7.3 | Yes |
Application | novell | edirectory | 8.7.3.8_presp9 | Yes |