Environment
Novell iManager 2.7.2 and prior
Situation
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Novell iManager. Authentication is not required to exploit this vulnerability.
A flaw exists in an application called by the iManager in order to handle importing/exporting of schema information. While importing/exporting from the schema, the sub-application fails to validate the length of its arguments while copying user-supplied data into statically allocated stack buffer. This can result in code
execution under the privileges of the application.
A flaw exists in an application called by the iManager in order to handle importing/exporting of schema information. While importing/exporting from the schema, the sub-application fails to validate the length of its arguments while copying user-supplied data into statically allocated stack buffer. This can result in code
execution under the privileges of the application.
Resolution
This vulnerability is resolved by using iManager 2.7.3
Resolution:
Install SP3 or newer for iManager 2.7 and the eDirectory 2.7.3 or newer Plug-in available at https://dl.netiq.com
Note: If the file version.txt is used to determine the version of iManager by scanning software, this file has been deprecated and isn't being updated to reflect the actually installed version. The file can be manually modified to reflect the actual version, if it is being used by scanning software.
Resolution:
Install SP3 or newer for iManager 2.7 and the eDirectory 2.7.3 or newer Plug-in available at https://dl.netiq.com
Note: If the file version.txt is used to determine the version of iManager by scanning software, this file has been deprecated and isn't being updated to reflect the actually installed version. The file can be manually modified to reflect the actual version, if it is being used by scanning software.
Status
Security AlertAdditional Information
This vulnerability was discovered and reported by researcher 1c239c43f521145fa8385d64a9c32243 through Zero Day Initiative (ZDI) established by TippingPoiint, a division of 3Com.
http://www.zerodayinitiative.com/advisories
ZDI-10-001
CVE-2009-4486
http://www.zerodayinitiative.com/advisories
ZDI-10-001
CVE-2009-4486