{"vuid":"VU#213165","idnumber":"213165","name":"Novell eDirectory iMonitor vulnerable to buffer overflow","keywords":["Novell","eDirectory Server","arbitrary command execution","iMonitor"],"overview":"Novell eDirectory iMonitor contains a buffer overflow that can be remotely exploited to allow execution of arbitrary code or crash an affected system.","clean_desc":"Novell eDirectory iMonitor is a service for monitoring servers in an eDirectory installation. A buffer overflow exists in Novell eDirectory version 8.7.3 iMonitor for Microsoft Windows 2000, 2003, and NT. A stack-based buffer within the iMonitor can be overwritten via a specially-crafted HTTP request. To exploit this vulnerability an attacker must have access to iMonitor which is installed on systems that are part of a Novell eDirectory tree. Note that exploits for this vulnerability have been made available on public web sites.","impact":"A remote attacker with access to a system in a Novell eDirectory tree may be able to crash an affected system or execute arbitrary code with the privileges of the iMonitor service, typically SYSTEM on Microsoft Windows.","resolution":"Apply a patch\nNovell has released the patch (edir873ptf_imon1.exe) to correct this issue.","workarounds":"Restrict access To limit your exposure to attacks you may wish to block access to Novell iMonitor from outside your network perimeter. However, blocking at the network perimeter would still allow attackers within the perimeter of your network to exploit the vulnerability. The use of host-based firewalls in addition to network-based firewalls can help restrict access to specific hosts within the network. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate.","sysaffected":"","thanks":"This vulnerability was reported by Peter Winter-Smith of NGSSoftware Insight Security Research.","author":"This document was written by Jeff Gennari.","public":["http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098568.htm","http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972038.htm","http://support.novell.com/servlet/filedownload/sec/pub/edir873ptf_imon1.exe","http://secunia.com/advisories/16393/","http://online.securityfocus.com/bid/14548"],"cveids":["CVE-2005-2551"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-08-11T21:29:44Z","publicdate":"2005-08-11T00:00:00Z","datefirstpublished":"2005-08-15T17:17:41Z","dateupdated":"2005-08-22T14:02:09Z","revision":48,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"14","cam_easeofexploitation":"14","cam_attackeraccessrequired":"12","cam_scorecurrent":"16.5375","cam_scorecurrentwidelyknown":"16.5375","cam_scorecurrentwidelyknownexploited":"29.7675","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":16.5375,"vulnote":null}