First published: Mon Jul 14 2008(Updated: )
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed arithmetic."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus eDirectory | =8.7.3 | |
Microfocus eDirectory | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3159 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2008-3159, update Novell eDirectory to versions 8.7.3 SP10b or 8.8.2 ftf2 or later.
CVE-2008-3159 affects Novell eDirectory versions 8.7.3 prior to SP10b and version 8.8 prior to 8.8.2 ftf2.
CVE-2008-3159 is caused by an integer overflow that can trigger a stack-based buffer overflow.
Yes, CVE-2008-3159 can be exploited remotely by attackers through unspecified vectors.