Vulnerabilities > CVE-2006-2496 - Buffer Overflow vulnerability in Novell Edirectory and Imonitor

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
novell
critical
nessus

Summary

Buffer overflow in iMonitor 2.4 in Novell eDirectory 8.8 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unknown attack vectors.

Vulnerable Configurations

Part Description Count
Application
Novell
2

Nessus

NASL familyGain a shell remotely
NASL idEDIRECTORY_IMONITOR_OVERFLOW.NASL
descriptionThe remote host is running a version of eDirectory iMonitor that is vulnerable to a remote buffer overflow. An attacker may exploit this flaw to execute arbitrary code on the remote host or to disable this service remotely. To exploit this flaw, an attacker would need to send a specially crafted packet to the remote service.
last seen2020-06-01
modified2020-06-02
plugin id19428
published2005-08-12
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/19428
titleNovell eDirectory Server iMonitor Multiple Remote Overflows
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(19428);
 script_version("1.19");
 script_cvs_date("Date: 2018/07/10 14:27:33");

 script_cve_id("CVE-2005-2551", "CVE-2006-2496");
 script_bugtraq_id(14548, 18026);

 script_name(english:"Novell eDirectory Server iMonitor Multiple Remote Overflows");
 script_summary(english:"Checks for a buffer overflow in eDirectory iMonitor");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a buffer overflow vulnerability.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of eDirectory iMonitor that is
vulnerable to a remote buffer overflow.  An attacker may exploit this
flaw to execute arbitrary code on the remote host or to disable this
service remotely. 

To exploit this flaw, an attacker would need to send a specially
crafted packet to the remote service.");
 script_set_attribute(attribute:"solution", value:
"http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm
http://www.zerodayinitiative.com/advisories/ZDI-06-016.html
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973759.htm");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/08/12");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/08/11");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:novell:edirectory");
 script_end_attributes();
 
 script_category(ACT_DENIAL);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");

 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 8008, 8010, 8028, 8030);
 exit(0);
}

# Check starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:8008, embedded:TRUE);
banner = get_http_banner (port:port);
if (! egrep(pattern:"Server: .*HttpStk/[0-9]+\.[0-9]+", string:banner))
  exit(0, "The web server on port "+port+" is not eDirectory iMonitor.");

 if (http_is_dead(port:port))
   exit(1, "The web server on port "+port+" is already dead.");

w = http_send_recv3(method:"GET",item:"/nds/" + crap(data:"A", length:0x1500), port:port,
  exit_on_fail: 0);

if (http_is_dead(port:port, retry: 3))
   security_hole(port);

Saint

bid18026
descriptionNovell eDirectory iMonitor NDS buffer overflow
idweb_tool_edirectorybo
osvdb25781
titleedirectory_imonitor_nds
typeremote