Novell Home

My Favorites

Close

Please to see your favorites.

Security Vulnerability: Novell eDirectory Heap-based Buffer Overflow

This document (7004912) is provided subject to the disclaimer at the end of this document.

Environment

Novell eDirectory 8.7.3.10 ftf1 and prior for All Platforms
Novell eDirectory 8.8.5 ftf1 and prior for All Platforms

Situation

Novell eDirectory permits unauthenticated users to query the server for information about specific objects.  The user can send a service request (NDS Verb 0x1) that has integer used in a memory allocation. A large integer can result in an integer wrap and a subsequent allocation returning an insufficient buffer, resulting in a heap-based buffer overflow.

Successful exploitation would grant an attacker the same privileges eDirectory is using and/or cause a crash of the eDirectory service resulting in a denial of service.

Resolution

This vulnerability is resolved by applying the following:

For eDirectory 8.7.3.X, apply eDirectory 8.7.3.10 ftf2 or newer.
For eDirectory 8.8.X, apply eDirectory 8.8.5.2 or newer.

Patches are available at http://dl.netiq.com

Status

Reported to Engineering
Security Alert

Additional Information

This vulnerability was discovered and researched by Chris Valasek and John McDonald of the IBM X-Force.

http://www.iss.net/threats/356.html

CVE-2009-0895

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7004912
  • Creation Date:23-NOV-09
  • Modified Date:27-JAN-14
    • NetIQeDirectory

Did this document solve your problem? Provide Feedback