Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote directory service is affected by multiple buffer overflows.

Description :

The remote host is running eDirectory, a directory service software
from Novell.

The installed version of eDirectory is affected by an integer overflow
issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well
as a heap-based buffer overflow that can be triggered by passing NULL
search parameters to the LDAP service. An unauthenticated attacker
may be able to leverage either issue to execute code on the remote
host with SYSTEM privileges.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-08-041/
http://archives.neohapsis.com/archives/fulldisclosure/2008-07/0144.html
http://www.nessus.org/u?0f5cb3d8
http://archives.neohapsis.com/archives/fulldisclosure/2008-07/0145.html
http://www.novell.com/support/viewContent.do?externalId=3694858
http://www.novell.com/support/viewContent.do?externalId=3843876

Solution :

Upgrade to eDirectory 8.8.2 FTF2 / 8.7.3 SP10b or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 33397 (edirectory_ds_integer_overflow.nasl)

Bugtraq ID: 30085
30175

CVE ID: CVE-2008-1809
CVE-2008-3159