Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-5478

EPSS 91.29% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-5478

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Novell eDirectory/iMonitor HTTPSTK栈缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Novell eDirectory是一个的跨平台的目录服务器。 Novell eDirectory在处理用户请求构造回应时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。 Novell的HTTP协议栈(httpstk)没有检查客户端所提供的HTTP Host请求头(如Host: www.host.com)的值。当服务器在准备HTTP重新定向响应调用snprintf()时可能会触发这个漏洞,导致以加载httpstk库进程的权限执行任意指令。BuildRedirectURL()调用snpri
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-5478

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-5478

Please Login to view more intelligence information

Same Patch Batch · n/a · 2006-10-24 · 20 CVEs total

CVE-2006-5474OneOrZero forgot password函数安全口令重置漏洞
CVE-2006-4573GNU Screen utf8组合字符处理多个不明漏洞
CVE-2006-4510Novell eDirectory LDAP服务evtFilteredMonitorEventsRequest函数任意代码执行漏洞
CVE-2006-4509Novell eDirectory evtFilteredMonitorEventsRequest函数整数溢出漏洞
CVE-2006-5481Castor多个PHP远程文件包含漏洞
CVE-2006-5480Castor 'lib/rs.php' PHP远程文件包含漏洞
CVE-2006-5479Novell eDirectory NCP引擎拒绝服务漏洞
CVE-2006-5477Drupal 特制的URL未明跨站脚本攻击漏洞
CVE-2006-5476Drupal 未授权跨站请求伪造漏洞
CVE-2006-5475Drupal XML解析器多个跨站脚本攻击漏洞
CVE-2006-5482FreeBSD 'ufs_vnops.c' ftruncate函数本地拒绝服务漏洞
CVE-2006-5473Softerra PHP Developer Library 'Description.php'PHP远程文件包含漏洞
CVE-2006-5472Softerra PHP Developer Library PHP远程文件包含漏洞
CVE-2006-5471Softerra PHP Developer Library 'grid3.lib.php'PHP远程文件包含漏洞
CVE-2006-4177Novell eDirectory NCP数据包处理远程堆溢出漏洞
CVE-2006-5486Sun Java System/iPlanet Messaging Server Webmail中的跨站脚本攻击漏洞
CVE-2006-5485SpeedBerg SPEEDBERG_PATH多个远程文件包含漏洞
CVE-2006-5484多款SSH Communications Security产品安全漏洞
CVE-2006-5483FreeBSD Scheduler策略本地拒绝服务漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2006-5478

No comments yet


Leave a comment