Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:NOVELL:EDIRECTORY-SOAP

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Novell eDirectory SOAP Handling Accept Language Header Heap Overflow

Release Date

2010/10/14

Update Number

1792

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Novell eDirectory SOAP Handling Accept Language Header Heap Overflow


This signature detects attempts to exploit a known buffer overflow vulnerability in Novell eDirectory. It is due to boundary error when processing SOAP-HTTP requests. By supplying overly large data to the Accept-Language header, a remote unauthenticated attacker can leverage this vulnerability to inject and execute arbitrary code on the target host with System or root level privileges. An attack targeting this can result in the injection and execution of arbitrary code. If code execution is successful, the behavior of the target depends on the intention of the attacker. Any injected code is executed within the system or root privileges. In an unsuccessful code execution attack, eDirectory Web console might terminate abnormally.

Extended Description

Novell eDirectory is prone to multiple buffer-overflow vulnerabilities. Successful exploits may allow attackers to execute arbitrary code within the context of the affected application or to cause denial-of-service conditions. These issues affect eDirectory 8.7.3 SP10 prior to 8.7.3 SP10 FTF1.

Affected Products

  • Novell eDirectory 8.7.3.10
  • Novell eDirectory 8.7.3 SP10b

References

  • BugTraq: 31553
  • CVE: CVE-2008-4479

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out