Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Directory)  >   Novell eDirectory Vendors:   Novell
Novell eDirectory Can Be Crashed With Requests Containing MS-DOS Device Names
SecurityTracker Alert ID:  1014177
SecurityTracker URL:
CVE Reference:   CVE-2005-1729   (Links to External Site)
Updated:  Aug 12 2008
Original Entry Date:  Jun 13 2005
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 8.7.3
Description:   CIRT.DK reported a vulnerability in Novell eDirectory. A remote user can cause denial of service conditions.

A remote user can supply a specially crafted HTTP request for an MS-DOS device name (e.g., AUX, CON, PRN, COM1, COM2, LPT1, LPT2) to cause the target service to crash.

Some demonstration exploit URLs are provided:


The vendor was notified on April 18, 2005.

A manual restart is required to return the system to normal operations.

Impact:   A remote user can cause the target service to crash.
Solution:   The vendor has issued a fixed version (8.7.3 IR6).
Vendor URL: (Links to External Site)
Cause:   Resource error
Underlying OS:  Windows (NT), Windows (2000), Windows (2003)

Message History:   None.

 Source Message Contents

Subject:  [CIRT.DK - Advisory] Novell eDirectory 8.7.3 DOS Device name Denial of Service

ID: NOVL102201 
Domain: primus Solution 
Class: Novell Fact: Novell eDirectory 8.7.3 for Windows 2000 Fact Novell
eDirectory 8.7.3 for Windows NT 
Symptom: Requesting "DOS Device in Path Name" Denial of Service 
Symptom: Attack causes error in dhost.exe application 
Symptom: Attack causes nds service to stop until manually restarted. 
Symptom: Problem is not reproducible when using the current interm release
for eDirectory 8.7.3 which is currently IR6

Read the full advisory at

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC