Описание
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed arithmetic."
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed arithmetic."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-3159
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43589
- http://secunia.com/advisories/30938
- http://securitytracker.com/id?1020431
- http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858
- http://www.securityfocus.com/bid/30085
- http://www.vupen.com/english/advisories/2008/1999
- http://www.zerodayinitiative.com/advisories/ZDI-08-041
EPSS
CVE ID
Связанные уязвимости
Integer overflow in ds.dlm, as used by dhost.exe, in Novell eDirectory 8.7.3.10 before 8.7.3 SP10b and 8.8 before 8.8.2 ftf2 allows remote attackers to execute arbitrary code via unspecified vectors that trigger a stack-based buffer overflow, related to "flawed arithmetic."
EPSS