Vulnerabilities > CVE-2006-2496 - Unspecified vulnerability in Novell Edirectory and Imonitor
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN novell
nessus
Summary
Buffer overflow in iMonitor 2.4 in Novell eDirectory 8.8 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown attack vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Gain a shell remotely |
NASL id | EDIRECTORY_IMONITOR_OVERFLOW.NASL |
description | The remote host is running a version of eDirectory iMonitor that is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host or to disable this service remotely. To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19428 |
published | 2005-08-12 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19428 |
title | Novell eDirectory Server iMonitor Multiple Remote Overflows |
code |
|
Saint
bid | 18026 |
description | Novell eDirectory iMonitor NDS buffer overflow |
id | web_tool_edirectorybo |
osvdb | 25781 |
title | edirectory_imonitor_nds |
type | remote |
References
- http://secunia.com/advisories/20139
- http://secunia.com/advisories/20139
- http://securitytracker.com/id?1016120
- http://securitytracker.com/id?1016120
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973759.htm
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973759.htm
- http://www.osvdb.org/25781
- http://www.osvdb.org/25781
- http://www.securityfocus.com/archive/1/434723/100/0/threaded
- http://www.securityfocus.com/archive/1/434723/100/0/threaded
- http://www.securityfocus.com/bid/18026
- http://www.securityfocus.com/bid/18026
- http://www.vupen.com/english/advisories/2006/1850
- http://www.vupen.com/english/advisories/2006/1850
- http://www.zerodayinitiative.com/advisories/ZDI-06-016.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26524
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26524