Novell is now a part of Micro Focus

My Favorites


Please to see your favorites.

Security Vulnerability: DHOST Content-Length Header Heap Overflow

This document (7000087) is provided subject to the disclaimer at the end of this document.


Novell eDirectory 8.8 for All Platforms
Novell eDirectory 8.7.3 for All Platforms


Exploit of the Content-Length can allow an attacker to set a zero sized buffer which a copy would then result in a buffer overflow and cause eDirectory to crash.

Exploitation of this vulnerability doesn't require authentication.

Exploitation of this vulnerability can result in a denial of service or arbitrary execution of code.

Exploitation requires network access.


For eDirectory 8.8:
Apply eDirectory 8.8.3

For eDirectory 8.7.3:
Apply eDirectory ftf1

Additional Information

ZDI-08-063: eDirectory Content-Length Header Heap Overflow

This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.



This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7000087
  • Creation Date:14-APR-08
  • Modified Date:26-APR-12
    • NetIQeDirectory

Did this document solve your problem? Provide Feedback