Check Point Advisories

Update Protection against Novell eDirectory dhost Buffer Overflow

Check Point Reference: CPAI-2009-241
Date Published: 6 Nov 2009
Severity: Critical
Last Updated: Thursday 01 January, 2009
Source: Bugtraq ID:  36815
Industry Reference:N/A
Protection Provided by:
Who is Vulnerable? Novell eDirectory 8.8 SP5
Novell eDirectory 8.8.1
Novell eDirectory 8.8.2
Vulnerability Description A remote code execution vulnerability has been reported in Novell eDirectory. Novell eDirectory is a Lightweight Directory Access Protocol (LDAP) server, intended for use as a part of an identity management solution.The vulnerability is due to a buffer overflow error in the dhost service when handling HTTP requests. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable system. Successful exploitation mat result in arbitrary code injection and execution.
Update/Patch AvaliableThe vendor has not released an advisory addressing this vulnerability.
Vulnerability DetailsThe vulnerability is due to lack of boundary validation when handling HTTP requests loading eDirectory modules. A remote, authenticated user could exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable Novell eDirectory Directory Service.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK