Novell eDirectory 8.8.x Multiple Security Vulnerabilities

critical Nessus Plugin ID 63338

Synopsis

The remote directory service is affected by multiple vulnerabilities.

Description

The remote host is running eDirectory, a directory service software from Novell. The installed version of Novell eDirectory is affected by multiple issues :

- An unspecified cross-site scripting flaw exists.
(CVE-2012-0428)

- It is possible to trigger a remote denial of service vulnerability by sending a malformed HTTP request. (CVE-2012-0429)
- An unspecified flaw may allow a remote attacker to gain access to administrator cookie information. (CVE-2012-0430)

- There is an unspecified stack-based buffer overflow in the Novell NCP implementation in eDirectory that has unspecified impact. (CVE-2012-0432)

Solution

Upgrade to eDirectory 8.8 SP6 Patch 7 / 8.8 SP7 Patch 2 or later.

See Also

https://seclists.org/fulldisclosure/2013/Jan/97

https://support.microfocus.com/kb/doc.php?id=3426981

http://www.nessus.org/u?caef468a

https://support.microfocus.com/kb/doc.php?id=7011539

https://support.microfocus.com/kb/doc.php?id=7011538

https://support.microfocus.com/kb/doc.php?id=7011533

Plugin Details

Severity: Critical

ID: 63338

File Name: edirectory_88sp7_patch2.nasl

Version: 1.15

Type: remote

Family: Misc.

Published: 12/27/2012

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:novell:edirectory

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/2/2012

Vulnerability Publication Date: 12/2/2012

Exploitable With

Core Impact

Metasploit (Novell eDirectory 8 Buffer Overflow)

Reference Information

CVE: CVE-2012-0428, CVE-2012-0429, CVE-2012-0430, CVE-2012-0432

BID: 57038

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990