Lucene search

K
zdi1c239c43f521145fa8385d64a9c32243ZDI-11-060
HistoryFeb 07, 2011 - 12:00 a.m.

Novell eDirectory Malformed NCP Request Denial of Service Vulnerability

2011-02-0700:00:00
1c239c43f521145fa8385d64a9c32243
www.zerodayinitiative.com
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.123 Low

EPSS

Percentile

95.4%

This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory. Authentication is not required in order to trigger this vulnerability. The flaw exists within Novell’s eDirectory Server’s NCP implementation. Novell’s eDirectory Server binds to port 524 for processing NCP requests. When the application processes a malformed FileSetLock request, the service will become unresponsive resulting in an inability to authenticate to that server.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.123 Low

EPSS

Percentile

95.4%

Related for ZDI-11-060