First published: Tue Oct 14 2008(Updated: )
Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocates a heap buffer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus eDirectory | >=8.7.3<8.7.3.10 | |
Microfocus eDirectory | >=8.8<8.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4480 is considered a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2008-4480, upgrade Novell eDirectory to version 8.8.3 or later, or apply any relevant security patches provided by Novell.
CVE-2008-4480 is categorized as a heap-based buffer overflow vulnerability.
CVE-2008-4480 affects Novell eDirectory versions prior to 8.8.3 and 8.7.3 before 8.7.3.10.
An attacker exploiting CVE-2008-4480 could execute arbitrary code on the affected system.