Environment
Novell eDirectory 8.8.1 and prior for Solaris, Linux, AIX and HP
Novell eDirectory 8.8.1 and prior for Windows 2000 and Windows 2003
Novell eDirectory 8.7.3.9 and prior for Solaris, Linux, AIX and HP
Novell eDirectory 8.7.3.9 and prior for Windows 2000 and Windows 2003
Novell eDirectory 8.8.1 and prior for Windows 2000 and Windows 2003
Novell eDirectory 8.7.3.9 and prior for Solaris, Linux, AIX and HP
Novell eDirectory 8.7.3.9 and prior for Windows 2000 and Windows 2003
Situation
A large LDAP Extended Request message can cause a stack overflow which overwrites a function pointer.
This overflow can cause a DoS by causing ndsd to core or possibly result in a situation allowing the execution of arbitrary code.
This overflow can cause dhost.exe to go into high utilization and cause ndsd to core.
This overflow can cause a DoS by causing ndsd to core or possibly result in a situation allowing the execution of arbitrary code.
This overflow can cause dhost.exe to go into high utilization and cause ndsd to core.
Resolution
The vulnerability is addressed in eDirectory 8.8.2.
Apply eDirectory 8.8.2 or later available on https://dl.netiq.com
For eDirectory 8.7.3:
Apply eDirectory 8.7.3.9 FTF3 with edir873931.tgz or later available on https://dl.netiq.com
Apply eDirectory 8.8.2 or later available on https://dl.netiq.com
For eDirectory 8.7.3:
Apply eDirectory 8.7.3.9 FTF3 with edir873931.tgz or later available on https://dl.netiq.com
Additional Information
ZDI-CAN-214: DoLBURPRequest Stack Overflow
http://www.zerodayinitiative.com/advisories/ZDI-CAN-214.html
This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.
CVE-2008-0924
http://www.zerodayinitiative.com/advisories/ZDI-CAN-214.html
This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.
CVE-2008-0924