Novell eDirectory Heap Overflow and Denial of Service Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Novell eDirectory, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system.
1. Due to heap overflow errors when processing update replica verbs (Opcode 0x23 and 0x24), which could be exploited by attackers to crash an affected service or execute arbitrary code.
2. Due to a heap overflow error when handling the DSV_READ verb (Opcode 0x0F), which could be exploited by attackers to crash an affected service or execute arbitrary code.
3. Due to an error when handling an invalid HTTP Content-Length field value, which could be exploited to cause a crash.
4. Due to an error when handling an oversized HTTP Accept-Language value, which could be exploited to cause a crash.
Impact
- Denial of Service
System / Technologies affected
- Novell eDirectory version 8.7.3 SP10 and prior
- Novell eDirectory version 8.8.2 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to version 8.8.3 or 8.7.3 SP10 FTF1.
http://www.novell.com/support/microsites/microsite.do
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with