Environment
Novell eDirectory 8.8 for Linux
Situation
This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory.
Authentication is not required in order to trigger this vulnerability.
The flaw exists within Novell's eDirectory Server's NCP implementation.
Novell's eDirectory Server binds to port 524 for processing NCP requests.
When the application processes a malformed FileSetLock request,
the service will become unresponsive resulting in an inability to authenticate to that server.
Authentication is not required in order to trigger this vulnerability.
The flaw exists within Novell's eDirectory Server's NCP implementation.
Novell's eDirectory Server binds to port 524 for processing NCP requests.
When the application processes a malformed FileSetLock request,
the service will become unresponsive resulting in an inability to authenticate to that server.
Resolution
This issue is addressed in eDirectory 8.8.6 Patch 2 and eDirectory 8.8.5 Patch 6 both of which can be found on Novell's File Finder.
As the affected process is bound to a TCP port, external exploitation of this vulnerability can be mitigated by ensuring no traffic can reach the machine on the specified port. This can be done at the network level with a firewall or other similar technology.
As the affected process is bound to a TCP port, external exploitation of this vulnerability can be mitigated by ensuring no traffic can reach the machine on the specified port. This can be done at the network level with a firewall or other similar technology.
Status
Reported to EngineeringSecurity Alert
Additional Information
This issue was reported by TippingPoint, The Zero Day Initiative as ZDI-CAN-445
http://www.zerodayinitiative.com/advisories/zdi-can-445.html
CVE-2010-4327 Novell eDirectory Malformed NCP Request Denial of Service Vulnerability
http://www.zerodayinitiative.com/advisories/zdi-can-445.html
CVE-2010-4327 Novell eDirectory Malformed NCP Request Denial of Service Vulnerability