Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:NOVELL:EDIRECTORY-ME-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Novell eDirectory Monitored Events Overflow

Release Date

2011/03/01

Update Number

1874

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Novell eDirectory Monitored Events Overflow


This signature detects attempts to exploit known buffer overflow and invalid-free vulnerabilities in Novell eDirectory. They are due to insufficient bound checking on a user-supplied buffer length value or referencing a value outside of an array. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Novell eDirectory server.

Extended Description

The Novell eDirectory server is prone to buffer-overflow and invalid-free vulnerabilities because it fails to perform sufficient bounds checking on client-supplied data before copying it to a buffer or referencing a value outside of an array. An attacker could leverage these issues to have arbitrary code execute with administrative privileges. A successful exploit could result in a denial of service or code execution, possibly leading to the complete compromise of the affected system. eDirectory 8.8/8.8.1 are vulnerable to these issues; prior versions may be affected as well.

Affected Products

  • Novell eDirectory 8.8
  • Novell eDirectory 8.8.1

References

  • BugTraq: 20663
  • BugTraq: 16593
  • CVE: CVE-2006-4510
  • CVE: CVE-2006-4509
  • CVE: CVE-2006-0717

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out