Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.800136
Kategorie:Buffer overflow
Titel:Novell eDirectory Multiple Vulnerabilities (Nov 2008) - Linux
Zusammenfassung:Novell eDirectory is prone to Multiple Vulnerabilities.
Beschreibung:Summary:
Novell eDirectory is prone to Multiple Vulnerabilities.

Vulnerability Insight:
The flaws are due to

- boundary error in LDAP and NDS services.

- boundary error in HTTP language header and HTTP content-length header.

- HTTP protocol stack(HTTPSTK) that does not properly filter HTML code from
user-supplied input.

Vulnerability Impact:
Successful exploitation allows remote code execution on the target
machines or can allow disclosure of potentially sensitive information or
can cause denial of service condition.

Affected Software/OS:
Novell eDirectory 8.8 SP2 and prior on Linux.

Solution:
Update to 8.8 Service Pack 3.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-5091
BugTraq ID: 30947
http://www.securityfocus.com/bid/30947
https://bugzilla.novell.com/show_bug.cgi?id=373853
http://www.securitytracker.com/id?1020788
http://www.vupen.com/english/advisories/2008/2462
XForce ISS Database: novell-edirectory-extensiblematch-dos(43590)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43590
Common Vulnerability Exposure (CVE) ID: CVE-2008-5092
http://www.securitytracker.com/id?1020786
Common Vulnerability Exposure (CVE) ID: CVE-2008-5093
http://www.securitytracker.com/id?1020785
XForce ISS Database: novell-edirectory-httpstk-xss(46667)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46667
Common Vulnerability Exposure (CVE) ID: CVE-2008-5094
http://www.securitytracker.com/id?1020787
CopyrightCopyright (C) 2008 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.