CVE-2009-4486 – Novell iManager eDirectory Plugin Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2009-4486
Stack-based buffer overflow in the eDirectory plugin in Novell iManager before 2.7.3 allows remote attackers to execute arbitrary code via vectors that trigger long arguments to an unspecified sub-application, related to importing and exporting from a schema. Desbordamiento del búfer de la pila en el plugin eDirectory en Novell iManager anterior a v2.7.3 permite a atacantes remotos ejecutar código de su elección a través de vectores que provoca argumentos largos para una sub-aplicación sin especificar, relacionado con la importación y exportación de un esquema. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Novell iManager. Authentication is not required to exploit this vulnerability. The flaw exists in an application called by the iManager in order to handle importing/exporting of schema information. While importing/exporting from the schema, the sub-application fails to validate the length of its arguments while copying user-supplied data into statically allocated stack buffer. • http://osvdb.org/61584 http://secunia.com/advisories/38030 http://www.novell.com/support/viewContent.do?externalId=7004985&sliceId=1 http://www.securityfocus.com/bid/37672 http://www.vupen.com/english/advisories/2010/0074 http://www.zerodayinitiative.com/advisories/ZDI-10-001 https://exchange.xforce.ibmcloud.com/vulnerabilities/55468 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-3488
https://notcve.org/view.php?id=CVE-2008-3488
Unspecified vulnerability in Novell iManager before 2.7 SP1 (2.7.1) allows remote attackers to delete Plug-in Studio created Property Book Pages via unknown vectors. Vulnerabilidad no especifada en Novell iManager versiones anteriores a 2.7 SP1 (2.7.1) permite a atacantes remotos borrar Plug-in Studio creado por Property Book Pages a través de vectores desconocidos. • http://secunia.com/advisories/31333 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5031820.html http://www.securityfocus.com/bid/30497 http://www.securitytracker.com/id?1020611 http://www.vupen.com/english/advisories/2008/2284 • CWE-264: Permissions, Privileges, and Access Controls •