First published: Fri Mar 28 2008(Updated: )
Stack-based buffer overflow in the DoLBURPRequest function in libnldap in ndsd in Novell eDirectory 8.7.3.9 and earlier, and 8.8.1 and earlier in the 8.8.x series, allows remote attackers to cause a denial of service (daemon crash or CPU consumption) or execute arbitrary code via a long delRequest LDAP Extended Request message, probably involving a long Distinguished Name (DN) field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus eDirectory | >=8.7<=8.7.3.9 | |
Microfocus eDirectory | >=8.8<=8.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0924 is classified as a critical vulnerability due to its potential for remote code execution or denial of service.
To fix CVE-2008-0924, update to Novell eDirectory version 8.8.2 or later, which resolves the buffer overflow issue.
CVE-2008-0924 affects Novell eDirectory versions 8.7.3.9 and earlier, as well as versions 8.8.1 and earlier in the 8.8.x series.
CVE-2008-0924 can be exploited by attackers to cause a denial of service through daemon crashes or by executing arbitrary code.
Mitigation without upgrading is difficult; the best approach is to apply the latest patches provided by Novell to eliminate the vulnerability.