Novell eDirectory iMonitor HTTP Protocol Stack (httpstk) Host HTTP Header Remote Overflow

high Nessus Plugin ID 22903

Synopsis

The remote web server is affected by a buffer overflow vulnerability.

Description

The installed version of Novell eDirectory on the remote host reportedly contains a buffer overflow that can be triggered with a specially crafted Host request header. An anonymous remote attacker may be able to leverage this flaw to execute code on the affected host, generally with super-user privileges.

Solution

Apply the eDirectory Post 8.7.3.8 FTF1 / 8.8.1 FTF1 patch as appropriate.

See Also

https://www.mnin.org/advisories/2006_novell_httpstk.pdf

https://seclists.org/fulldisclosure/2006/Oct/433

http://download.novell.com/patch/finder/

Plugin Details

Severity: High

ID: 22903

File Name: edirectory_hostname_overflow.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 10/23/2006

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:novell:edirectory

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/23/2006

Vulnerability Publication Date: 10/23/2006

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Novell eDirectory NDS Server Host Header Overflow)

Reference Information

CVE: CVE-2006-5478

BID: 20655

Secunia: 22519