TippingPoint Zero Day Initiative

Novell eDirectory Core Protocol Opcode 0x24 Heap Overflow Vulnerability

ZDI-08-066: October 8th, 2008


Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 6177. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within dhost.exe, the service responsible for directory replication which is bound by default to TCP port 524. Improper parsing within opcode 0x24 via the Netware Core Protocol can result in an arithmetic calculation based on supplied user-input resulting in an under-allocated heap buffer. This fault can be leveraged to result in arbitrary code execution.

Vendor Response

Novell has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2008-05-19 - Vulnerability reported to vendor
    2008-10-08 - Coordinated public release of advisory


This vulnerability was discovered by:
    Sebastian Apelt (webmaster@buzzworld.org)