Check Point Reference: | CPAI-2009-241 |
Date Published: | 6 Nov 2009 |
Severity: | Critical |
Last Updated: | Thursday 01 January, 2009 |
Source: | Bugtraq ID: 36815 |
Industry Reference: | N/A |
Protection Provided by: | |
Who is Vulnerable? | Novell eDirectory 8.8 SP5 Novell eDirectory 8.8.1 Novell eDirectory 8.8.2 |
Vulnerability Description | A remote code execution vulnerability has been reported in Novell eDirectory. Novell eDirectory is a Lightweight Directory Access Protocol (LDAP) server, intended for use as a part of an identity management solution.The vulnerability is due to a buffer overflow error in the dhost service when handling HTTP requests. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable system. Successful exploitation mat result in arbitrary code injection and execution. |
Update/Patch Avaliable | The vendor has not released an advisory addressing this vulnerability. |
Vulnerability Details | The vulnerability is due to lack of boundary validation when handling HTTP requests loading eDirectory modules. A remote, authenticated user could exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable Novell eDirectory Directory Service. |