SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Directory)  >   Novell eDirectory Vendors:   Novell
Novell eDirectory Server 'imonitor' Buffer Overflow Allows Remote Users to Execute Arbitrary Code
SecurityTracker Alert ID:  1014661
SecurityTracker URL:  http://securitytracker.com/id/1014661
CVE Reference:   CVE-2005-2551   (Links to External Site)
Updated:  Jun 8 2008
Original Entry Date:  Aug 12 2005
Impact:   Denial of service via network, Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.7.3
Description:   A vulnerability was reported in Novell eDirectory Server. A remote user can execute arbitrary code on the target system.

A remote user can cause 'dhost.exe' to crash or execute arbitrary code with Local System privileges.

[Editor's note: NGSSoftware announced that the details about the vulnerability will be withheld from public disclosure for three months.]

Impact:   A remote user can execute arbitrary code on the target system with Local System privileges.

A remote user can cause 'dhost.exe' to crash.

Solution:   This vendor has issued a fixed, available at:

http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm

Vendor URL:  support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (NT), Windows (2000)

Message History:   None.


 Source Message Contents

Subject:  High Risk Vulnerability in Novell eDirectory Server

Peter Winter-Smith of NGSSoftware has discovered a high risk vulnerability
in Novell eDirectory Server. This flaw can be exploited to achieve arbitrary
code execution with Local System privileges on an affected server.

This issue has fixed in Novell eDirectory Server version 8.7.3 solution ID
NOVL103077 which may be downloaded from:

http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm

NGSSoftware are going to withhold details of this flaw for three months.
Full details will be published on the 2nd of November 2005. This three month
window will allow users of Novell eDirectory Server the time needed to apply
the patch before the details are released to the general public. This
reflects NGSSoftware's approach to responsible disclosure.


NGSSoftware Insight Security Research
http://www.ngssoftware.com
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC