Novell patches vulnerability in BorderManager 3.8 Client Trust
The Novell BorderManager 3.8 network administration software includes a Client Trust agent for network clients, in which a security vulnerability has been discovered by the Zero Day Initiative (ZDI). By default the agent listens on UDP port 3024 and accepts validation requests to this port. In the event of such a query, the client software copies a user-supplied name into a buffer until it encounters a wide char backslash or a null character. If neither of these is found, the application just keeps on copying. A buffer overflow occurs when the excess-length captured data is subsequently copied into a fixed size buffer. As a result it is possible to execute injected code. Valid credentials for the system are not required in order to exploit this vulnerability. Novell has released an update which fixes the vulnerability. Administrators should install the update as soon as possible.
- Novell Client Trust Heap Overflow Vulnerability, security advisory from ZDI
- BorderManager 3.8 Client Trust Security Update1 1.5, download the updates from Novell