Page 6 of 35 results (0.021 seconds)

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

ncp in Novell eDirectory before 8.7.3 SP9, and 8.8.x before 8.8.1 FTF2, does not properly handle NCP fragments with a negative length, which allows remote attackers to cause a denial of service (daemon crash) when the heap is written to a log file. ncp en Novell eDirectory anterior a 8.7.3 SP9, y 8.8.x anterior a 8.8.1 FTF2, no maneja adecuadamente fragmentos NCP con una longitud negativa, lo cual permite a atacantes remotos provocar una denegación de servicio (caída del demonio) cuando el montón se escribe a un fichero de registro de eventos. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=518 http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=3924657&sliceId=SAL_Public http://www.securityfocus.com/bid/23685 http://www.securitytracker.com/id?1017972 http://www.vupen.com/english/advisories/2007/1550 https://exchange.xforce.ibmcloud.com/vulnerabilities/33921 •

CVSS: 7.5EPSS: 95%CPEs: 10EXPL: 4

Multiple stack-based buffer overflows in Novell eDirectory 8.8.x before 8.8.1 FTF1, and 8.x up to 8.7.3.8, and Novell NetMail before 3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a long HTTP Host header, which triggers an overflow in the BuildRedirectURL function; or vectors related to a username containing a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or (6) Networked Messaging Application Protocol (NMAP) Netmail services. Múltiples desbordamientos de búfer basado en pila en Novell eDirectory 8.8.x anterior a 8.8.1 FTF1, y 8.x hasta 8.7.3.8, y Novell NetMail anterior a 3.52e FTF2, permite a atacantes remotos ejecutar código de su elección mediante (1) una cabecera HTTP Host larga, que provoca el desbordamiento en la función BuildRedirectURL; o vectores relacionados con un nombre de usuario que contiene un carácter . (punto) en los servicios Netmail (2) SMTP, (3) POP, (4) IMAP, (5) HTTP o (6) Networked Messaging Application Protocol (NMAP). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netmail. • https://www.exploit-db.com/exploits/28835 https://www.exploit-db.com/exploits/28836 https://www.exploit-db.com/exploits/28837 https://www.exploit-db.com/exploits/16773 http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050382.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050388.html http://secunia.com/advisories/22519 http://securitytracker.com/id?1017125 http://securitytracker.com/id?1017141 http://support.novell.com/cgi-bin/search/searchti • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The NCP Engine in Novell eDirectory before 8.7.3.8 FTF1 allows remote attackers to cause an unspecified denial of service via a certain "NCP Fragment." El motor NCP en Novell eDirectory anterior a 8.7.3.8 FTF1 permite a atacantes remotos provocar una denegación de servicio no especificada mediante un cierto "Fragmento NCP". • http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm •

CVSS: 7.5EPSS: 35%CPEs: 2EXPL: 0

Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended. Desbordamiento de búfer basado en montículo en el motor NCP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal NCP sobre IP que provoca que NCP lea más información de la deseada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=426 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm http://www.securityfocus.com/bid/20664 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29768 •

CVSS: 4.9EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in the NCPENGINE in Novell eDirectory 8.7.3.8 allows local users to cause a denial of service (CPU consumption) via unspecified vectors, as originally demonstrated using a Nessus scan. Vulnerabilidad no especificada en el NCPENGINE de Novell eDirectory 8.7.3.8 permite a usuarios locales provocar una denegación de servicio (agotamiento de CPU) a través de vectores no especificados, como se ha demostrado originalmente utilizando un escaneo Nessus. • http://secunia.com/advisories/21496 http://securitytracker.com/id?1016695 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973826.htm http://www.osvdb.org/28369 http://www.securityfocus.com/bid/19498 •