CWE
416 399
Advisory Published
Updated

CVE-2008-5038: Use After Free

First published: Wed Nov 12 2008(Updated: )

Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 before 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote attackers to cause a denial of service and possibly execute arbitrary code via a sequence of "Get NCP Extension Information By Name" requests that cause one thread to operate on memory after it has been freed in another thread, which triggers memory corruption, aka Novell Bug 373852.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Novell eDirectory<8.7.3
Novell eDirectory=8.7.3-sp1
Novell eDirectory=8.7.3-sp2
Novell eDirectory=8.7.3-sp3
Novell eDirectory=8.7.3-sp4
Novell eDirectory=8.7.3-sp5
Novell eDirectory=8.7.3-sp6
Novell eDirectory=8.7.3-sp7
Novell eDirectory=8.7.3-sp8
Novell eDirectory=8.7.3-sp9
Novell eDirectory=8.8
Novell eDirectory=8.6.2
Novell eDirectory=8.5.27
Novell eDirectory=8.7.3-sp5
Novell eDirectory=8.7
Novell eDirectory=8.0
Novell eDirectory=8.7.3
Novell eDirectory=8.7.3-sp4
Novell eDirectory=8.7.3-sp1
Novell eDirectory<=8.7.3
Novell eDirectory=8.5.12a
Novell eDirectory=8.7.3-sp8
Novell eDirectory=8.5
Novell eDirectory=8.7.3-sp3
Novell eDirectory=8.7.3-sp6
Novell eDirectory=8.8-sp2
Novell eDirectory=8.7.1
Novell eDirectory=8.7.1-sp1
Novell eDirectory=8.7.3-sp7
Novell eDirectory=8.7.3-sp2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2008-5038?

    CVE-2008-5038 is categorized as a high severity vulnerability that can lead to denial of service and potential arbitrary code execution.

  • How do I fix CVE-2008-5038?

    To mitigate CVE-2008-5038, you should upgrade to Novell eDirectory versions 8.7.3 SP10 FTF1 or 8.8 SP2 and apply relevant patches.

  • What software versions are affected by CVE-2008-5038?

    CVE-2008-5038 affects Novell eDirectory versions prior to 8.7.3 SP10 FTF1 and 8.8 SP2 including multiple service packs of 8.7.3.

  • Can CVE-2008-5038 be exploited remotely?

    Yes, CVE-2008-5038 can be exploited remotely through a crafted sequence of requests to the affected NCP feature.

  • What are the potential impacts of CVE-2008-5038?

    Exploitation of CVE-2008-5038 can lead to denial of service or unauthorized execution of arbitrary code on the affected system.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203