NOVL-2002-2963827 - Remote Manager Security Issue - NW5.1

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

 Security Alert: NOVL-2002-2963827
          Title: Remote Manager Security Issue - NW5.1 
           Date: 16-Oct-2002
       Revision: Original
   Product Name: Netware 5.1 eDir v. 85.x 
 OS/Platform(s): Netware 5.1
  Reference URL: http://support.novell.com/servlet/tidfinder/2963827
    Vendor Name: Novell, Inc. 
     Vendor URL: http://www.novell.com
Security Alerts: http://support.novell.com/security-alerts 
        Affects: DS.NLM, DSREPAIR.NLM, NLDAP.NLM
    Identifiers: See Also NOVL-2002-2963767
        Credits: None

============================ Description ============================

Inappropriate permissions may be granted to users logging into 
expired-password accounts from Remote Manager.

============================== Impact ===============================

Inappropriate permissions may be granted to users logging into 
expired-password accounts from Remote Manager.

======================== Recommended Actions ========================

See detailed instructions in the referenced Technical Information 
Document (TID) http://support.novell.com/servlet/tidfinder/2963827.

eDirectory update for NetWare 5.1 servers running with the eDirectory
85.x database. 

Your server must already be running eDirectory 85.x in order to use 
this update!!! 

Files changed since the last public release: 
DS.NLM (v 85.30) 
DSREPAIR.NLM (v 85.20) 
NLDAP.NLM (v 85.24) 

Do not install on a NetWare 4.x or 6.x server.  
Do not install on a NDS 6.x, 7.x, 8.x, 86.x or 87.x servers


============================ DISCLAIMER =============================

The content of this document is believed to be accurate at the time 
of publishing based on currently available information. However, the 
information is provided "AS IS" without any warranty or 
representation. Your use of the document constitutes acceptance of 
this disclaimer. Novell disclaims all warranties, express or implied,
regarding this document, including the warranties of merchantability 
and fitness for a particular purpose. Novell is not liable for any 
direct, indirect, or consequential loss or damage arising from use 
of, or reliance on, this document or any security alert, even if 
Novell has been advised of the possibility of such damages and even 
if such damages are foreseeable.

============================ Appendices =============================

None

================ Contacting Novell Security Alerts ==================

To report suspected security vulnerabilities in Novell products, send
email to
            secure@novell.com

or use the web form at our website

            http://support.novell.com/security-alerts

PGP users may send signed/encrypted information to us using our PGP 
key, available from the pgpkeys.mit.edu server, or our website.

Users wishing to be notified when Novell Security Alerts are issued 
may register their email address at

            http://www.novell.com/info/list/ 

Security Alerts, Novell, Inc. PGP Key Fingerprint:

F5AE 9265 0A34 F84E 580E  9B87 3AC1 1974 DE05 0FDB

========================= Revision History ==========================
       Original: 16-Oct-2002 - Original Publication

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Security 7.0.3

iQA/AwUBPc/qqzrBGXTeBQ/bEQLhDACg5uTaOq4NLt/NrNRTI4WWJqfGgPEAoLkR
1L86OXqtcNKuKDsJyfb+FSk3
=jDmO
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux