Some vulnerabilities have been reported in Novell eDirectory, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
1) An array-indexing error in the NetWare Core Protocol (NCP) implementation can be exploited to cause the "ndsd" process to become unresponsive via a specially crafted request sent to e.g. TCP port 524.
2) A boundary error in dhost.exe can be exploited to cause a buffer overflow via a specially crafted GET request.
3) An unspecified error can be exploited to cause Dhost to crash e.g. by running a certain security scan against the server.
The vulnerabilities are reported in versions prior to 8.8 SP5 Patch 4.
Solution: Update to version 8.8 SP5 Patch 4.
Provided and/or discovered by: 1) The vendor credits 1c239c43f521145fa8385d64a9c32243 via ZDI.
3) Reported by the vendor.
Original Advisory: ZDI:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org