Novell eDirectory < 8.8 SP6 Patch 5 Multiple Vulnerabilities

high Nessus Plugin ID 61709

Synopsis

The remote directory service is affected by multiple vulnerabilities.

Description

The remote host is running eDirectory, a directory service application from Novell. According to its self-reported version number, this software is affected by multiple stack-based buffer overflow and memory corruption vulnerabilities. A remote, unauthenticated attacker could exploit the most severe of these vulnerabilities to execute arbitrary code.

Solution

Upgrade to eDirectory 8.8 SP6 Patch 5 or later.

See Also

http://www.nessus.org/u?ae3ef2f4

https://www.zerodayinitiative.com/advisories/ZDI-12-146/

https://support.microfocus.com/kb/doc.php?id=7009947

http://download.novell.com/Download?buildid=bqt3K-sXJEs~

https://support.microfocus.com/kb/doc.php?id=3426981

Plugin Details

Severity: High

ID: 61709

File Name: edirectory_88sp6_patch5.nasl

Version: 1.5

Type: remote

Family: Misc.

Published: 8/29/2012

Updated: 12/4/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2010-1929

Vulnerability Information

CPE: cpe:/a:novell:edirectory

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/23/2012

Vulnerability Publication Date: 6/23/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-1929

BID: 40480, 55157