Vulnerabilities > CVE-2008-3159 - Numeric Errors vulnerability in Novell Edirectory 8.7.3/8.8
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed arithmetic."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Gain a shell remotely |
NASL id | EDIRECTORY_DS_INTEGER_OVERFLOW.NASL |
description | The remote host is running eDirectory, a directory service software from Novell. The installed version of eDirectory is affected by an integer overflow issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well as a heap-based buffer overflow that can be triggered by passing NULL search parameters to the LDAP service. An unauthenticated attacker may be able to leverage either issue to execute code on the remote host with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 33397 |
published | 2008-07-07 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/33397 |
title | Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows |
code |
|
References
- http://secunia.com/advisories/30938
- http://secunia.com/advisories/30938
- http://securitytracker.com/id?1020431
- http://securitytracker.com/id?1020431
- http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858
- http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858
- http://www.securityfocus.com/bid/30085
- http://www.securityfocus.com/bid/30085
- http://www.vupen.com/english/advisories/2008/1999
- http://www.vupen.com/english/advisories/2008/1999
- http://www.zerodayinitiative.com/advisories/ZDI-08-041/
- http://www.zerodayinitiative.com/advisories/ZDI-08-041/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43589
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43589