Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows. Affected by integer overflow and heap-based buffer overflow. Allows unauthenticated remote code execution with SYSTEM privileges
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
CVE | CVE-2008-1809 | 14 Jul 200818:41 | β | cve |
CVE | CVE-2008-3159 | 14 Jul 200818:41 | β | cve |
Prion | Heap overflow | 14 Jul 200818:41 | β | prion |
Prion | Integer overflow | 14 Jul 200818:41 | β | prion |
seebug.org | Novell eDirectory LDAPζε‘Searchεζ°ε ζΊ’εΊζΌζ΄ | 12 Jul 200800:00 | β | seebug |
Cvelist | CVE-2008-1809 | 14 Jul 200818:00 | β | cvelist |
Cvelist | CVE-2008-3159 | 14 Jul 200818:00 | β | cvelist |
securityvulns | iDefense Security Advisory 07.09.08: Novell eDirectory LDAP Search Request Heap Corruption Vulnerability | 12 Jul 200800:00 | β | securityvulns |
securityvulns | Novell eDirectory multiple security vulnerabilities | 12 Jul 200800:00 | β | securityvulns |
NVD | CVE-2008-1809 | 14 Jul 200818:41 | β | nvd |
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(33397);
script_version("1.20");
script_cvs_date("Date: 2018/11/15 20:50:22");
script_cve_id("CVE-2008-1809", "CVE-2008-3159");
script_bugtraq_id(30085, 30175);
script_name(english:"Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows");
script_summary(english:"Checks version from an ldap search");
script_set_attribute(attribute:"synopsis", value:
"The remote directory service is affected by multiple buffer overflows.");
script_set_attribute(attribute:"description", value:
"The remote host is running eDirectory, a directory service software
from Novell.
The installed version of eDirectory is affected by an integer overflow
issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well
as a heap-based buffer overflow that can be triggered by passing NULL
search parameters to the LDAP service. An unauthenticated attacker
may be able to leverage either issue to execute code on the remote
host with SYSTEM privileges.");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-08-041/");
script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Jul/145");
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0f5cb3d8");
script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Jul/146");
script_set_attribute(attribute:"see_also", value:"https://support.microfocus.com/kb/doc.php?id=3694858");
script_set_attribute(attribute:"see_also", value:"https://support.microfocus.com/kb/doc.php?id=3843876");
script_set_attribute(attribute:"solution", value:
"Upgrade to eDirectory 8.8.2 FTF2 / 8.7.3 SP10b or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(119, 189);
script_set_attribute(attribute:"plugin_publication_date", value: "2008/07/07");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:novell:edirectory");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Gain a shell remotely");
script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
script_dependencies("ldap_search.nasl");
script_require_keys("Services/ldap");
script_require_ports("Services/ldap", 389);
exit(0);
}
include("global_settings.inc");
port = get_kb_item("Services/ldap");
if (isnull(port)) exit(0);
banner = get_kb_item(string("LDAP/",port,"/vendorVersion"));
if ( "Novell eDirectory" >!< banner ) exit(0);
if (!egrep(pattern:"^LDAP Agent for Novell eDirectory [0-9]+\.[0-9]+.* \([0-9]+\.[0-9]+\)$", string:banner))
exit(0);
main = ereg_replace(pattern:"^LDAP Agent for Novell eDirectory ([0-9]+\.[0-9]+).* \([0-9]+\.[0-9]+\)$", string:banner, replace:"\1");
version = ereg_replace(pattern:"^LDAP Agent for Novell eDirectory [0-9]+\.[0-9]+.* \(([0-9]+\.[0-9]+)\)$", string:banner, replace:"\1");
version = split(version, sep:".", keep:FALSE);
build = int(version[0]);
rev = int(version[1]);
if ( ( ("8.7" >< main) && ( (build < 10555) || ( build == 10555 && rev < 98 ) ) ) ||
( ("8.8" >< main) && ( (build < 20216) || ( build == 20216 && rev < 51 ) ) ) )
{
if(report_verbosity > 0)
{
report = string(
"\n", banner," is installed on the remote host.\n"
);
security_hole(port:port, extra:report);
}
else
security_hole(port);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo