CVE-2008-5038

Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 before 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote attackers to cause a denial of service and possibly execute arbitrary code via a sequence of "Get NCP Extension Information By Name" requests that cause one thread to operate on memory after it has been freed in another thread, which triggers memory corruption, aka Novell Bug 373852.
References
Link Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=748 Broken Link
http://osvdb.org/48206 Broken Link
http://secunia.com/advisories/32395 Broken Link Vendor Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html Broken Link Patch Vendor Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html Broken Link Patch
http://www.novell.com/support/viewContent.do?externalId=3426981 Broken Link
http://www.securityfocus.com/bid/31956 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021117 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2937 Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46138 Third Party Advisory VDB Entry
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=748 Broken Link
http://osvdb.org/48206 Broken Link
http://secunia.com/advisories/32395 Broken Link Vendor Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html Broken Link Patch Vendor Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html Broken Link Patch
http://www.novell.com/support/viewContent.do?externalId=3426981 Broken Link
http://www.securityfocus.com/bid/31956 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021117 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2937 Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46138 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:edirectory:*:*:*:*:*:*:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp1:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp2:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp3:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp4:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp5:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp6:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp7:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp8:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.7.3:sp9:*:*:*:windows:*:*
cpe:2.3:a:novell:edirectory:8.8:-:*:*:*:windows:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=748 - Broken Link () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=748 - Broken Link
References () http://osvdb.org/48206 - Broken Link () http://osvdb.org/48206 - Broken Link
References () http://secunia.com/advisories/32395 - Broken Link, Vendor Advisory () http://secunia.com/advisories/32395 - Broken Link, Vendor Advisory
References () http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html - Broken Link, Patch, Vendor Advisory () http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html - Broken Link, Patch, Vendor Advisory
References () http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html - Broken Link, Patch () http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html - Broken Link, Patch
References () http://www.novell.com/support/viewContent.do?externalId=3426981 - Broken Link () http://www.novell.com/support/viewContent.do?externalId=3426981 - Broken Link
References () http://www.securityfocus.com/bid/31956 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/31956 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1021117 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1021117 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/2937 - Broken Link, Vendor Advisory () http://www.vupen.com/english/advisories/2008/2937 - Broken Link, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46138 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/46138 - Third Party Advisory, VDB Entry

Information

Published : 2008-11-12 21:09

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5038

Mitre link : CVE-2008-5038

CVE.ORG link : CVE-2008-5038


JSON object : View

Products Affected

novell

  • edirectory
CWE
CWE-416

Use After Free