APP: Novell eDirectory NDS Verb 0x01 Integer Overflow

An integer overflow has been reported in Novell eDirectory. The flaw is due to errors when processing maliciously crafted service requests (NDS Verb 0x1) with an overly large integer value that would be used in a memory allocation. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious request to a target host. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the affected application abnormally causing a denial of service condition.

Extended Description

Novell eDirectory is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. The issue affects the following: eDirectory 8.7.3.10 ftf1 and prior eDirectory 8.8.5 ftf1 and prior

Affected Products

Novell edirectory

References

BugTraq: 37184

CVE: CVE-2009-0895

Short Name
APP:NOVELL:NDS-IO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
0x01 CVE-2009-0895 Integer NDS Novell Overflow Verb bid:37184 eDirectory
Release Date
10/13/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
tcp/524
False Positive
Unknown
Vendors

Novell

CVSS Score

10.0

Found a potential security threat?