Multiple integer overflows in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.73 before 8.7.3.10 ftf1, allow remote attackers to execute arbitrary code via a crafted (1) Content-Length header in a SOAP request or (2) Netware Core Protocol opcode 0x0F message, which triggers a heap-based buffer overflow.
Novell eDirectory is vulnerable to a heap-based buffer overflow, caused by an integer overflow error in the Web console. By sending a specially-crafted SOAP request containing an HTTP Content-Length header, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.