Skip to main content

Novell eDirectory Buffer Overflow and Denial of Service Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 4 Jun 2010 5546 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Novell eDirectory, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system.

1. An error in NDSD when processing a bad verb, which could be exploited to crash an affected daemon.

2. A buffer overflow error in DHOST when processing malformed requests, which could be exploited by attackers to crash an affected process or execute arbitrary code.

3. Due to DHOST using predictable session cookies, which could allow attackers to bypass restrictions.

4. An error in DHOST when handling malformed requests sent by certain scanners, which could cause a vulnerable process to crash, creating a denial of service condition.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Novell eDirectory versions prior to 8.8 SP5 patch4

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Upgrade to Novell eDirectory version 8.8 SP5 patch4.
http://download.novell.com/Download?buildid=n8PWgAEctzY~
http://download.novell.com/Download?buildid=dJUBKQVvUxA~
http://download.novell.com/Download?buildid=PtHnoNhAZtw~


Vulnerability Identifier


Source


Related Link