Novell eDirectory 8.8.x Multiple Security Vulnerabilities

Critical Nessus Plugin ID 63338


The remote directory service is affected by multiple vulnerabilities.


The remote host is running eDirectory, a directory service software from Novell. The installed version of Novell eDirectory is affected by multiple issues :

- An unspecified cross-site scripting flaw exists.

- It is possible to trigger a remote denial of service vulnerability by sending a malformed HTTP request. (CVE-2012-0429)
- An unspecified flaw may allow a remote attacker to gain access to administrator cookie information. (CVE-2012-0430)

- There is an unspecified stack-based buffer overflow in the Novell NCP implementation in eDirectory that has unspecified impact. (CVE-2012-0432)


Upgrade to eDirectory 8.8 SP6 Patch 7 / 8.8 SP7 Patch 2 or later.

See Also

Plugin Details

Severity: Critical

ID: 63338

File Name: edirectory_88sp7_patch2.nasl

Version: 1.15

Type: remote

Family: Misc.

Published: 2012/12/27

Updated: 2018/11/15

Dependencies: 25701

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:novell:edirectory

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/12/02

Vulnerability Publication Date: 2012/12/02

Exploitable With

Core Impact

Metasploit (Novell eDirectory 8 Buffer Overflow)

Reference Information

CVE: CVE-2012-0428, CVE-2012-0429, CVE-2012-0430, CVE-2012-0432

BID: 57038

EDB-ID: 24205, 24323

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990