How to Buy
This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote directory service is affected by multiple buffer overflows.
The remote host is running eDirectory, a directory service software
The installed version of eDirectory is affected by an integer overflow
issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well
as a heap-based buffer overflow that can be triggered by passing NULL
search parameters to the LDAP service. An unauthenticated attacker
may be able to leverage either issue to execute code on the remote
host with SYSTEM privileges.
See also :
Upgrade to eDirectory 8.8.2 FTF2 / 8.7.3 SP10b or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 33397 (edirectory_ds_integer_overflow.nasl)
Bugtraq ID: 3008530175
CVE ID: CVE-2008-1809CVE-2008-3159
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.