Security Vulnerability: Novell eDirectory Malformed NCP Request Denial of Service Vulnerability
This document (7007781) is provided subject to the disclaimer at the end of this document.
Authentication is not required in order to trigger this vulnerability.
The flaw exists within Novell's eDirectory Server's NCP implementation.
Novell's eDirectory Server binds to port 524 for processing NCP requests.
When the application processes a malformed FileSetLock request,
the service will become unresponsive resulting in an inability to authenticate to that server.
As the affected process is bound to a TCP port, external exploitation of this vulnerability can be mitigated by ensuring no traffic can reach the machine on the specified port. This can be done at the network level with a firewall or other similar technology.
StatusReported to Engineering
CVE-2010-4327 Novell eDirectory Malformed NCP Request Denial of Service Vulnerability
This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7007781
- Creation Date:04-FEB-11
- Modified Date:26-APR-12
Did this document solve your problem? Provide Feedback