Security Vulnerability: DHOST Content-Length Header Heap Overflow
This document (7000087) is provided subject to the disclaimer at the end of this document.
Novell eDirectory 8.7.3 for All Platforms
Exploitation of this vulnerability doesn't require authentication.
Exploitation of this vulnerability can result in a denial of service or arbitrary execution of code.
Exploitation requires network access.
Apply eDirectory 8.8.3
For eDirectory 8.7.3:
Apply eDirectory 18.104.22.168 ftf1
This vulnerability was reported by Zero Day Initiative (ZDI) established by TippingPoint, a division of 3Com.
This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:7000087
- Creation Date:14-APR-08
- Modified Date:26-APR-12
Did this document solve your problem? Provide Feedback