First published: Tue Oct 14 2008(Updated: )
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus NetIQ eDirectory | >=8.7.3<8.7.3.10 | |
Micro Focus NetIQ eDirectory | >=8.8<8.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4479 has a high severity rating due to the potential for remote code execution.
To fix CVE-2008-4479, upgrade to Novell eDirectory version 8.8.3 or 8.7.3.10 ftf1 or later.
CVE-2008-4479 is caused by a heap-based buffer overflow in dhost.exe when processing overly long Accept-Language headers in SOAP requests.
CVE-2008-4479 affects Novell eDirectory versions earlier than 8.8.3 and 8.7.3 versions prior to 8.7.3.10 ftf1.
Yes, CVE-2008-4479 can be exploited remotely via malicious SOAP requests.