Environment
Novell eDirectory 8.8 for All Platforms
Situation
This vulnerability exists in eDirectory 8.8 versions 8.8.5 ftf3 and prior. eDirectory 8.7.3 was not found to be vulnerable.
This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory. Authentication is not required in order to trigger this vulnerability.
The flaw exists within Novell's eDirectory Server's NCP implementation which binds, by default, to TCP port 524. While handling a malformed request, the application explicitly trusts a field when translating it
to an index into a table of counters. If this index is too large, the application will set a value outside the array and the ndsd process will become unresponsive resulting in an inability to authenticate to that server.
This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory. Authentication is not required in order to trigger this vulnerability.
The flaw exists within Novell's eDirectory Server's NCP implementation which binds, by default, to TCP port 524. While handling a malformed request, the application explicitly trusts a field when translating it
to an index into a table of counters. If this index is too large, the application will set a value outside the array and the ndsd process will become unresponsive resulting in an inability to authenticate to that server.
Resolution
This vulnerability has been resolved in eDirectory 8.8.5 ftf4
To resolve this issue download and apply the latest patch for eDirectory 8.8 at https://dl.netiq.com
To resolve this issue download and apply the latest patch for eDirectory 8.8 at https://dl.netiq.com
Status
Reported to EngineeringSecurity Alert
Additional Information
This vulnerability was reported as ZDI-CAN-477 by Tippingpoint, The Zero Day Initiative ZDI, discovered by: * 1c239c43f521145fa8385d64a9c32243
CVE # pending
CVE # pending