Novell eDirectory RelativeToFullDN Parsing Remote Code Execution VulnerabilityZDI-12-146: August 22nd, 2012
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 12472. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory. Authentication is not required to exploit this vulnerability.
The specific flaw exists within how the service handles a specially formatted LDAP request. When handling a particular set of commands, the server will copy a string described in the packet into a statically sized buffer without validating it's length. This leads to a stack-based overflow and as such can be exploited to achieve code execution under the context of the application.
Vendor ResponseNovell has issued an update to correct this vulnerability. More details can be found at:
2011-10-28 - Vulnerability reported to vendor
2012-08-22 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: