Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 prior to 8.8.3, and 8.73 prior to 8.7.3.10 ftf1, allow remote malicious users to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, which triggers a heap-based buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
novell edirectory 8.8.1 |
||
novell edirectory 8.8 |
||
novell edirectory 8.7.3.9 |
||
novell edirectory 8.8.2 |
||
novell edirectory 8.7.3.8 |
||
novell edirectory 8.7.3.8_presp9 |
||
novell edirectory 8.7.1 |
||
novell edirectory 8.7.3 |
||
novell edirectory |
||
novell edirectory 8.7 |