10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.822 High
EPSS
Percentile
98.4%
The remote host is running eDirectory, a directory service software from Novell.
The installed version of eDirectory is affected by an integer overflow issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well as a heap-based buffer overflow that can be triggered by passing NULL search parameters to the LDAP service. An unauthenticated attacker may be able to leverage either issue to execute code on the remote host with SYSTEM privileges.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(33397);
script_version("1.20");
script_cvs_date("Date: 2018/11/15 20:50:22");
script_cve_id("CVE-2008-1809", "CVE-2008-3159");
script_bugtraq_id(30085, 30175);
script_name(english:"Novell eDirectory < 8.8.2 FTF2 / 8.7.3 SP10b Multiple Remote Overflows");
script_summary(english:"Checks version from an ldap search");
script_set_attribute(attribute:"synopsis", value:
"The remote directory service is affected by multiple buffer overflows.");
script_set_attribute(attribute:"description", value:
"The remote host is running eDirectory, a directory service software
from Novell.
The installed version of eDirectory is affected by an integer overflow
issue in ds.dlm / dhost.exe (bound by default to TCP port 524) as well
as a heap-based buffer overflow that can be triggered by passing NULL
search parameters to the LDAP service. An unauthenticated attacker
may be able to leverage either issue to execute code on the remote
host with SYSTEM privileges.");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-08-041/");
script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Jul/145");
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0f5cb3d8");
script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Jul/146");
script_set_attribute(attribute:"see_also", value:"https://support.microfocus.com/kb/doc.php?id=3694858");
script_set_attribute(attribute:"see_also", value:"https://support.microfocus.com/kb/doc.php?id=3843876");
script_set_attribute(attribute:"solution", value:
"Upgrade to eDirectory 8.8.2 FTF2 / 8.7.3 SP10b or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(119, 189);
script_set_attribute(attribute:"plugin_publication_date", value: "2008/07/07");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:novell:edirectory");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Gain a shell remotely");
script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
script_dependencies("ldap_search.nasl");
script_require_keys("Services/ldap");
script_require_ports("Services/ldap", 389);
exit(0);
}
include("global_settings.inc");
port = get_kb_item("Services/ldap");
if (isnull(port)) exit(0);
banner = get_kb_item(string("LDAP/",port,"/vendorVersion"));
if ( "Novell eDirectory" >!< banner ) exit(0);
if (!egrep(pattern:"^LDAP Agent for Novell eDirectory [0-9]+\.[0-9]+.* \([0-9]+\.[0-9]+\)$", string:banner))
exit(0);
main = ereg_replace(pattern:"^LDAP Agent for Novell eDirectory ([0-9]+\.[0-9]+).* \([0-9]+\.[0-9]+\)$", string:banner, replace:"\1");
version = ereg_replace(pattern:"^LDAP Agent for Novell eDirectory [0-9]+\.[0-9]+.* \(([0-9]+\.[0-9]+)\)$", string:banner, replace:"\1");
version = split(version, sep:".", keep:FALSE);
build = int(version[0]);
rev = int(version[1]);
if ( ( ("8.7" >< main) && ( (build < 10555) || ( build == 10555 && rev < 98 ) ) ) ||
( ("8.8" >< main) && ( (build < 20216) || ( build == 20216 && rev < 51 ) ) ) )
{
if(report_verbosity > 0)
{
report = string(
"\n", banner," is installed on the remote host.\n"
);
security_hole(port:port, extra:report);
}
else
security_hole(port);
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | edirectory | cpe:/a:novell:edirectory |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3159
www.nessus.org/u?0f5cb3d8
seclists.org/fulldisclosure/2008/Jul/145
seclists.org/fulldisclosure/2008/Jul/146
support.microfocus.com/kb/doc.php?id=3694858
support.microfocus.com/kb/doc.php?id=3843876
www.zerodayinitiative.com/advisories/ZDI-08-041/