Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocates a heap buffer.
http://www.zerodayinitiative.com/advisories/ZDI-08-066/
http://www.vupen.com/english/advisories/2008/2738
http://www.securitytracker.com/id?1020990
http://www.securityfocus.com/archive/1/497169/100/0/threaded
http://www.novell.com/support/viewContent.do?externalId=3477912
http://www.novell.com/support/viewContent.do?externalId=3426981
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html