Vulnerability Name:

CVE-2009-0895

Assigned:2009-05-19
Published:2009-05-19
Updated:2017-08-16
Summary:Integer overflow in Novell eDirectory 8.7.3.x before 8.7.3.10 ftf2 and 8.8.x before 8.8.5.2 allows remote attackers to execute arbitrary code via an NDS Verb 0x1 request containing a large integer value that triggers a heap-based buffer overflow.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-189
References:Source: ISS
Type: UNKNOWN
20091124 Novell eDirectory Remote Code Execution

Source: CONFIRM
Type: VENDOR_ADVISORY
http://www.novell.com/support/viewContent.do?externalId=7004912

Source: BID
Type: UNKNOWN
37184

Source: VUPEN
Type: VENDOR_ADVISORY
ADV-2009-3379

Source: MISC
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=524344

Source: MISC
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=545887

Source: XF
Type: UNKNOWN
application-control-request-overflow(50616)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp10_b:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp10:ftf1:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp10:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp5:ftf1:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp4:ftf1:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp3:ftf1:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.7.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8:sp3:ftf3:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8.5::ftf1:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8.2::ftf1:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:edirectory:8.7.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:edirectory:8.8:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell edirectory 8.7.3
    novell edirectory 8.7.3 sp10_b
    novell edirectory 8.7.3 sp10
    novell edirectory 8.7.3 sp10
    novell edirectory 8.7.3 sp5
    novell edirectory 8.7.3 sp4
    novell edirectory 8.7.3 sp3
    novell edirectory 8.7.3 sp5
    novell edirectory 8.7.3 sp4
    novell edirectory 8.7.3 sp3
    novell edirectory 8.7.3.10
    novell edirectory 8.7.3.8
    novell edirectory 8.7.3.9
    novell edirectory 8.8
    novell edirectory 8.8.1
    novell edirectory 8.8.2
    novell edirectory 8.8 sp1
    novell edirectory 8.8 sp2
    novell edirectory 8.8 sp3
    novell edirectory 8.8 sp4
    novell edirectory 8.8.5
    novell edirectory 8.8.2
    novell edirectory 8.7.3
    novell edirectory 8.8