====================================================================== Secunia Research 14/07/2009 - Novell eDirectory iMonitor "Accept-Language" Buffer Overflow - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10 ====================================================================== 1) Affected Software * Novell eDirectory 8.8 SP3 and 8.8 SP3 FTF3 NOTE: Other versions may also be affected. ====================================================================== 2) Severity Rating: Less critical Impact: Denial of Service Where: Local network ====================================================================== 3) Vendor's Description of Software "... Novell eDirectory is an LDAP directory service, and forms the basis for many of the world's largest identity-management deployments. Since its debut more than ten years ago, eDirectory has been trusted for its scalability, compatibility, reliability, manageability and security". Product Link: http://www.novell.com/products/edirectory/ ====================================================================== 4) Description of Vulnerability Secunia Research has discovered a vulnerability in Novell eDirectory, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an off-by-one error in the iMonitor component when processing HTTP requests. This can be exploited to cause a stack-based buffer overflow via an HTTP request having a specially crafted "Accept-Language" header. ====================================================================== 5) Solution Update to version 8.8 SP5. ====================================================================== 6) Time Table 05/03/2009 - Vendor notified. 11/03/2009 - Vendor response. 14/07/2009 - Public disclosure due to the release of 8.8 SP5. ====================================================================== 7) Credits Discovered by Alin Rad Pop, Secunia Research. ====================================================================== 8) References The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2009-0192 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2009-13/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================