Environment
Novell eDirectory 8.8 for All Platforms
Novell eDirectory 8.7.3 for All Platforms
Novell eDirectory 8.7.3 for All Platforms
Situation
Exploit of the Content-Length can allow an attacker to set a zero sized buffer which a copy would then result in a buffer overflow and cause eDirectory to crash.
Exploitation of this vulnerability doesn't require authentication.
Exploitation of this vulnerability can result in a denial of service or arbitrary execution of code.
Exploitation requires network access.
Exploitation of this vulnerability doesn't require authentication.
Exploitation of this vulnerability can result in a denial of service or arbitrary execution of code.
Exploitation requires network access.
Resolution
For eDirectory 8.8:
Apply eDirectory 8.8.3
For eDirectory 8.7.3:
Apply eDirectory 8.7.3.10 ftf1
Apply eDirectory 8.8.3
For eDirectory 8.7.3:
Apply eDirectory 8.7.3.10 ftf1
Additional Information
ZDI-08-063: eDirectory Content-Length Header Heap Overflow
http://www.zerodayinitiative.com/advisories/ZDI-08-063.html
This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.
CVE-2008-4478
http://www.zerodayinitiative.com/advisories/ZDI-08-063.html
This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.
CVE-2008-4478