SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Directory)  >   Novell eDirectory Vendors:   Novell
Novell eDirectory NCP Request Processing Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1021117
SecurityTracker URL:  http://securitytracker.com/id/1021117
CVE Reference:   CVE-2008-5038   (Links to External Site)
Updated:  Nov 17 2008
Original Entry Date:  Oct 29 2008
Impact:   Execution of arbitrary code via network, Root access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.8.2
Description:   A vulnerability was reported in Novell eDirectory. A remote user can execute arbitrary code on the target system.

A remote user can send a series of specially crafted 'Get NCP Extension Information By Name' requests to trigger a memory corruption error in the NetWare Core Protocol (NCP) implementation and execute arbitrary code.

The vendor was notified on March 10, 2008.

An anonymous researcher reported this vulnerability via iDefense.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (8.8.2-71.12).

The vendor's advisories are available at:

http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html

Vendor URL:  support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC