Security Vulnerability: iManager eDirectory Plugin Remote Code Execution

  • 7004985
  • 07-Dec-2009
  • 21-Mar-2014

Environment


Novell iManager 2.7.2 and prior

Situation

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Novell iManager. Authentication is not required to exploit this vulnerability.
 
A flaw exists in an application called by the iManager in order to handle importing/exporting of schema information. While importing/exporting from the schema, the sub-application fails to validate the length of its arguments while copying user-supplied data into statically allocated stack buffer. This can result in code
execution under the privileges of the application.

Resolution

This vulnerability is resolved by using iManager 2.7.3

Resolution:

Install SP3 or newer for iManager 2.7 and the eDirectory 2.7.3 or newer Plug-in available at https://dl.netiq.com

Note:  If the file version.txt is used to determine the version of iManager by scanning software, this file has been deprecated and isn't being updated to reflect the actually installed version.  The file can be manually modified to reflect the actual version, if it is being used by scanning software.

Status

Security Alert

Additional Information

This vulnerability was discovered and reported by researcher 1c239c43f521145fa8385d64a9c32243 through Zero Day Initiative (ZDI) established by TippingPoiint, a division of 3Com.

http://www.zerodayinitiative.com/advisories

ZDI-10-001

CVE-2009-4486

Feedback service temporarily unavailable. For content questions or problems, please contact Support.