Manuel,
the vulnerability details have been submitted by me on June 1, 2006
CST/CDT (June 2, 2006 GMT+1). So I've found the vulnerability before
Michael Ligh and Ryan Smith did it.
Please accept my apologies for the insinuation that you may have
personally tried to steal another researchers
ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
October 26, 2006
-- CVE ID:
CVE-2006-5478
-- Affected Vendor:
Novell
-- Affected Products:
Novell eDirectory 8.8.1
-- TippingPoint(TM) IPS
On 10/27/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since October 26, 2006 by Digital Vaccine protection
filter ID 4519. For further product information on the
ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
October 26, 2006
-- CVE ID:
CVE-2006-5478
-- Affected Vendor:
Novell
-- Affected Products:
Novell eDirectory 8.8.1
-- TippingPoint(TM) IPS