Security Vulnerability: Oversized DN Stack Overflow

  • 3382120
  • 24-Mar-2008
  • 27-Jan-2014

Environment

Novell eDirectory 8.8.1 and prior for Solaris, Linux, AIX and HP
Novell eDirectory 8.8.1 and prior for Windows 2000 and Windows 2003
Novell eDirectory 8.7.3.9 and prior for Solaris, Linux, AIX and HP
Novell eDirectory 8.7.3.9 and prior for Windows 2000 and Windows 2003

Situation

A large LDAP Extended Request message can cause a stack overflow which overwrites a function pointer.

This overflow can cause a DoS by causing ndsd to core or possibly result in a situation allowing the execution of arbitrary code.

This overflow can cause dhost.exe to go into high utilization and cause ndsd to core.

Resolution

The vulnerability is addressed in eDirectory 8.8.2.

Apply eDirectory 8.8.2 or later available on https://dl.netiq.com

For eDirectory 8.7.3:
Apply eDirectory 8.7.3.9 FTF3 with edir873931.tgz or later available on https://dl.netiq.com




Additional Information

ZDI-CAN-214: DoLBURPRequest Stack Overflow

http://www.zerodayinitiative.com/advisories/ZDI-CAN-214.html

This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.

CVE-2008-0924

Feedback service temporarily unavailable. For content questions or problems, please contact Support.