|Multiple stack-based buffer overflows in Novell eDirectory 8.8.x
before 8.8.1 FTF1, and 8.x up to 188.8.131.52, and Novell NetMail before
3.52e FTF2, allow remote attackers to execute arbitrary code via (1) a
long HTTP Host header, which triggers an overflow in the
BuildRedirectURL function; or vectors related to a username containing
a . (dot) character in the (2) SMTP, (3) POP, (4) IMAP, (5) HTTP, or
(6) Networked Messaging Application Protocol (NMAP) Netmail services.