Integer overflow in Novell eDirectory 8.7.3.x before 8.7.3.10 ftf2 and 8.8.x before 8.8.5.2 allows remote attackers to execute arbitrary code via an NDS Verb 0x1 request containing a large integer value that triggers a heap-based buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/3379 | vdb entry patch vendor advisory |
http://www.securityfocus.com/bid/37184 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50616 | vdb entry |
http://www.iss.net/threats/356.html | third party advisory |
http://secunia.com/advisories/37554 | third party advisory vendor advisory |
http://www.novell.com/support/viewContent.do?externalId=7004912 | patch vendor advisory |
https://bugzilla.novell.com/show_bug.cgi?id=524344 | |
https://bugzilla.novell.com/show_bug.cgi?id=545887 |