Novell Home

My Favorites

Close

Please to see your favorites.

Security Vulnerability - eDirectory Core Protocol Opcode 0x0F Heap Overflow

This document (7001184) is provided subject to the disclaimer at the end of this document.

Environment


Novell eDirectory 8.8 for All Platforms
Novell eDirectory 8.7.3 for All Platforms

Situation

A flaw exists in the calculation of memory allocation based on user supplied input.  This flaw can result in a heap overflow which could cause a ds crash and/or arbitrary code execution.

Resolution

To resolve this issue:

In eDirectory 8.8.X:
Apply eDirectory 8.8.3

In eDirectory 8.7.3.X
Fix is targetted for eDirectory 8.7.3.10 ftf1

Status

Reported to Engineering
Security Alert

Additional Information

ZDI-08-065

http://www.zerodayinitiative.com/advisories/zdi-08-065.html

This vulnerability was discovered by Sebastian Apelt (webmaster@buzzworld.org) and reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.

CVE-2008-4478

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7001184
  • Creation Date:19-AUG-08
  • Modified Date:26-APR-12
    • NetIQeDirectory

Did this document solve your problem? Provide Feedback