Novell eDirectory Buffer Overflow and Denial of Service Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system.
1. An error in NDSD when processing a bad verb, which could be exploited to crash an affected daemon.
2. A buffer overflow error in DHOST when processing malformed requests, which could be exploited by attackers to crash an affected process or execute arbitrary code.
3. Due to DHOST using predictable session cookies, which could allow attackers to bypass restrictions.
4. An error in DHOST when handling malformed requests sent by certain scanners, which could cause a vulnerable process to crash, creating a denial of service condition.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Novell eDirectory versions prior to 8.8 SP5 patch4
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to Novell eDirectory version 8.8 SP5 patch4.
http://download.novell.com/Download?buildid=n8PWgAEctzY~
http://download.novell.com/Download?buildid=dJUBKQVvUxA~
http://download.novell.com/Download?buildid=PtHnoNhAZtw~
Vulnerability Identifier
Source
Related Link
Share with