CVE-2006-4521
https://notcve.org/view.php?id=CVE-2006-4521
The BerDecodeLoginDataRequest function in the libnmasldap.so NMAS module in Novell eDirectory 8.8 and 8.8.1 before the Security Services 2.0.3 patch does not properly increment a pointer when handling certain input, which allows remote attackers to cause a denial of service (invalid memory access) via a crafted login request. La función BerDecodeLoginDataRequest en el módulo libnmasldap.so NMAS en Novell eDirectory 8.8 y 8.8.1 anterior al parche Security Services 2.0.3 no incrementa de forma adecuada el puntero cuando al manejar cierta entrada, lo cual permite a un atacante remoto provocar denegación de servicio (acceso a memoria inválido) a través de una respuesta de login manipulada • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=437 http://secunia.com/advisories/22660 http://securitytracker.com/id?1017140 http://www.securityfocus.com/bid/20842 http://www.vupen.com/english/advisories/2006/4293 https://exchange.xforce.ibmcloud.com/vulnerabilities/29963 •
CVE-2006-4177
https://notcve.org/view.php?id=CVE-2006-4177
Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended. Desbordamiento de búfer basado en montículo en el motor NCP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante un paquete artesanal NCP sobre IP que provoca que NCP lea más información de la deseada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=426 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974600.htm http://www.securityfocus.com/bid/20664 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29768 •
CVE-2006-4510
https://notcve.org/view.php?id=CVE-2006-4510
The evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request containing a value that is larger than the number of objects transmitted, which triggers an invalid free of unallocated memory. La función evtFilteredMonitorEventsRequest en el servicio LDAP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante una petición artesanal que contiene un valor más largo que el número de objetos transmitidos, lo cual dispara una liberación inválida de memoria no asignada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=428 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://www.securityfocus.com/bid/20663 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29752 •
CVE-2006-4509
https://notcve.org/view.php?id=CVE-2006-4509
Integer overflow in the evtFilteredMonitorEventsRequest function in the LDAP service in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted request. Desbordamiento de entero en la función evtFilteredMonitorEventsRequest en el servicio LDAP en Novell eDirectory anterior a 8.8.1 FTF1 permite a atacantes remotos ejecutar código de su elección mediante una petición artesanal. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=427 http://secunia.com/advisories/22506 http://securitytracker.com/id?1017104 http://www.securityfocus.com/bid/20663 http://www.vupen.com/english/advisories/2006/4142 https://exchange.xforce.ibmcloud.com/vulnerabilities/29764 •
CVE-2006-2496 – Novell eDirectory 8.8 NDS Server Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2006-2496
Buffer overflow in iMonitor 2.4 in Novell eDirectory 8.8 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown attack vectors. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory. Exploitation does not require authentication. The specific flaw exists within the iMonitor NDS Server, which by default exposes an HTTP interface on TCP port 8028 and an HTTPS interface on TCP port 8030. During the parsing of long URIs to the 'nds' path a trivially exploitable stack-based buffer overflow occurs. • http://secunia.com/advisories/20139 http://securitytracker.com/id?1016120 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973759.htm http://www.osvdb.org/25781 http://www.securityfocus.com/archive/1/434723/100/0/threaded http://www.securityfocus.com/bid/18026 http://www.vupen.com/english/advisories/2006/1850 http://www.zerodayinitiative.com/advisories/ZDI-06-016.html https://exchange.xforce.ibmcloud.com/vulnerabilities/26524 •