Описание
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.
Ссылки
- Third Party Advisory
- Third Party Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия от 8.7.3 (включая) до 8.7.3.10 (исключая)Версия от 8.8 (включая) до 8.8.3 (исключая)
Одно из
cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.2652
Средний
10 Critical
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.
EPSS
Процентиль: 96%
0.2652
Средний
10 Critical
CVSS2
Дефекты
CWE-119