Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.800136
Categoría:Buffer overflow
Título:Novell eDirectory Multiple Vulnerabilities (Nov 2008) - Linux
Resumen:Novell eDirectory is prone to Multiple Vulnerabilities.
Descripción:Summary:
Novell eDirectory is prone to Multiple Vulnerabilities.

Vulnerability Insight:
The flaws are due to

- boundary error in LDAP and NDS services.

- boundary error in HTTP language header and HTTP content-length header.

- HTTP protocol stack(HTTPSTK) that does not properly filter HTML code from
user-supplied input.

Vulnerability Impact:
Successful exploitation allows remote code execution on the target
machines or can allow disclosure of potentially sensitive information or
can cause denial of service condition.

Affected Software/OS:
Novell eDirectory 8.8 SP2 and prior on Linux.

Solution:
Update to 8.8 Service Pack 3.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-5091
BugTraq ID: 30947
http://www.securityfocus.com/bid/30947
https://bugzilla.novell.com/show_bug.cgi?id=373853
http://www.securitytracker.com/id?1020788
http://www.vupen.com/english/advisories/2008/2462
XForce ISS Database: novell-edirectory-extensiblematch-dos(43590)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43590
Common Vulnerability Exposure (CVE) ID: CVE-2008-5092
http://www.securitytracker.com/id?1020786
Common Vulnerability Exposure (CVE) ID: CVE-2008-5093
http://www.securitytracker.com/id?1020785
XForce ISS Database: novell-edirectory-httpstk-xss(46667)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46667
Common Vulnerability Exposure (CVE) ID: CVE-2008-5094
http://www.securitytracker.com/id?1020787
CopyrightCopyright (C) 2008 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.