Check Point Advisories

Preemptive Protection against Novell eDirectory Buffer Overflow Vulnerability

Check Point Reference: CPAI-2006-055
Date Published: 31 May 2006
Severity: Medium
Last Updated: Monday 07 May, 2007
Source: ZDI-06-016
Industry Reference:CVE-2006-2496
Protection Provided by:
Who is Vulnerable? Novell iMonitor 2.4
Novell eDirectory 8.8
Vulnerability Description A beffer overflow vulnerability has been identified in Novell eDirectory. By supplying an overly long URI, remote attackers could execute arbitrary code on vulnerable installations of Novell eDirectory.
Vulnerability StatusA Metasploit framework exploit module (edirectory_imonitor2.pm) is available.
Update/Patch Avaliable 
Vulnerability DetailsThe specific flaw exists within the iMonitor NDS Server, which by default exposes an HTTP interface on TCP port 8028. During the parsing of long URIs to the 'nds' path a stack-based buffer overflow occurs.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK