Vulnerabilities > CVE-2005-2551 - Unspecified vulnerability in Novell Edirectory 8.7.3
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in dhost.exe in iMonitor for Novell eDirectory 8.7.3 on Windows allows attackers to cause a denial of service (crash) and obtain access to files via unknown vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow. CVE-2005-2551. Remote exploit for windows platform id EDB-ID:16769 last seen 2016-02-02 modified 2010-07-13 published 2010-07-13 reporter metasploit source https://www.exploit-db.com/download/16769/ title eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow description Novell eDirectory 8.7.3 iMonitor Remote Stack Overflow. CVE-2005-2551. Remote exploit for windows platform id EDB-ID:1152 last seen 2016-01-31 modified 2005-08-12 published 2005-08-12 reporter N/A source https://www.exploit-db.com/download/1152/ title Novell eDirectory 8.7.3 iMonitor Remote Stack Overflow
Metasploit
description | This module exploits a stack buffer overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware. NOTE: repeated exploitation attempts may cause eDirectory to crash. It does not restart automatically in a default installation. |
id | MSF:EXPLOIT/WINDOWS/HTTP/EDIRECTORY_IMONITOR |
last seen | 2020-03-06 |
modified | 2017-07-24 |
published | 2005-12-26 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2551 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/edirectory_imonitor.rb |
title | eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow |
Nessus
NASL family | Gain a shell remotely |
NASL id | EDIRECTORY_IMONITOR_OVERFLOW.NASL |
description | The remote host is running a version of eDirectory iMonitor that is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host or to disable this service remotely. To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19428 |
published | 2005-08-12 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19428 |
title | Novell eDirectory Server iMonitor Multiple Remote Overflows |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/82943/edirectory_imonitor.rb.txt |
id | PACKETSTORM:82943 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | anonymous |
source | https://packetstormsecurity.com/files/82943/eDirectory-8.7.3-iMonitor-Remote-Stack-Overflow.html |
title | eDirectory 8.7.3 iMonitor Remote Stack Overflow |
Saint
bid | 14548 |
description | Novell eDirectory iMonitor buffer overflow |
id | web_tool_edirectorybo |
osvdb | 18703 |
title | edirectory_imonitor_bo |
type | remote |
References
- http://secunia.com/advisories/16393
- http://secunia.com/advisories/16393
- http://securitytracker.com/id?1014661
- http://securitytracker.com/id?1014661
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm
- http://www.kb.cert.org/vuls/id/213165
- http://www.kb.cert.org/vuls/id/213165
- http://www.securityfocus.com/bid/14548
- http://www.securityfocus.com/bid/14548