CVE-2008-4480

N/A Unknown
Published: October 14, 2008 Modified: April 23, 2026
View on NVD

Description

Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.x before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a crafted Netware Core Protocol opcode 0x24 message that triggers a calculation error that under-allocates a heap buffer.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/32111
Source: cve@mitre.org
Third Party Advisory
http://securityreason.com/securityalert/4404
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/archive/1/497169/100/0/threaded
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020990
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2738
Source: cve@mitre.org
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-066/
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://secunia.com/advisories/32111
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securityreason.com/securityalert/4404
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=3426981
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=3477912
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/497169/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020990
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2738
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-066/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

22 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
24.1%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

novell