Novell eDirectory Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilites have been identified in Novell eDirectory, which could be exploited by attackers to execute arbitrary scripting code, cause a denial of service or compromise a vulnerable system.
1. An unspecified heap overflow error, which could allow attackers to execute arbitrary code.
2. An unspecified memory corruption error, which could allow remote attackers to execute arbitrary code.
3. An unspecified buffer overflow error in LDAP, which could allow attackers to execute arbitrary code.
4. An unspecified input validation error in HTTPSTK, which could be exploited to conduct cross site scripting attacks.
5. A heap overflow error in HTTPSTK when processing the "Language" header, which could allow attackers to execute arbitrary code.
6. A heap overflow error in HTTPSTK when processing the "Content-length" header, which could allow attackers to execute arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- Novell eDirectory version 8.8
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to Novell eDirectory 8.8 SP3 :
http://www.novell.com/support/microsites/microsite.do
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with