Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6pp4-gfm6-5rm4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended.

Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended.

EPSS

Процентиль: 93%
0.09582
Низкий

Связанные уязвимости

nvd
больше 19 лет назад

Heap-based buffer overflow in the NCP engine in Novell eDirectory before 8.8.1 FTF1 allows remote attackers to execute arbitrary code via a crafted NCP over IP packet that causes NCP to read more data than intended.

EPSS

Процентиль: 93%
0.09582
Низкий