Novell eDirectory versions 8.8.1 and prior, eDirectory versions and 220.127.116.11 and prior, and NetMail version 3.52d and prior contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code with elevated privileges.
This vulnerability exists due to insufficient boundary checking within the HTTPSTK component. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system, triggering a buffer overflow prior to authentication. The resulting memory corruption could allow the attacker to crash the affected service or possibly execute arbitrary code with the privileges of the eDirectory service, which typically runs as
SYSTEM or root.
Exploit code is available.
Novell has confirmed this vulnerability in technical information documents and released software updates that correct it.