Check Point Reference: | CPAI-2006-055 |
Date Published: | 31 May 2006 |
Severity: | Medium |
Last Updated: | Monday 07 May, 2007 |
Source: | ZDI-06-016 |
Industry Reference: | CVE-2006-2496 |
Protection Provided by: | |
Who is Vulnerable? | Novell iMonitor 2.4 Novell eDirectory 8.8 |
Vulnerability Description | A beffer overflow vulnerability has been identified in Novell eDirectory. By supplying an overly long URI, remote attackers could execute arbitrary code on vulnerable installations of Novell eDirectory. |
Vulnerability Status | A Metasploit framework exploit module (edirectory_imonitor2.pm) is available. |
Update/Patch Avaliable | |
Vulnerability Details | The specific flaw exists within the iMonitor NDS Server, which by default exposes an HTTP interface on TCP port 8028. During the parsing of long URIs to the 'nds' path a stack-based buffer overflow occurs. |