---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Novell eDirectory Multiple Vulnerabilities SECUNIA ADVISORY ID: SA22506 VERIFY ADVISORY: http://secunia.com/advisories/22506/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: Novell eDirectory 8.x http://secunia.com/product/1120/ DESCRIPTION: Multiple vulnerabilities have been reported in Novell eDirectory, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error within the NCP engine when processing NCP over IP can be exploited to cause a heap-based buffer overflow via a specially crafted packet. 2) An integer overflow error within the "evtFilteredMonitorEventsRequest()" function can be exploited to cause a heap-based buffer overflow via a specially crafted request. 3) An invalid free in the "evtFilteredMonitorEventsRequest()" function can be exploited via a specially crafted request. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in versions 8.8 and 8.8.1. Prior versions may also be affected. SOLUTION: eDirectory Post 8.8.1 FTF1 for NW & Win32: http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.exe/ eDirectory Post 8.8.1 FTF1 for Linux\Unix: http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.tgz/ PROVIDED AND/OR DISCOVERED BY: 1) Discovered by an anonymous person and reported via iDefense Labs. 2) Discovered by an anonymous person and reported via iDefense Labs. 3) Joshua J. Drake, iDefense Labs. ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=426 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=427 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=428 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------