Novell iManager is prone to a stack-based buffer overflow vulnerability that can be exploited by authenticated users to execute arbitrary code, and to an off-by-one error that can be abused by remote, unauthenticated attackers to cause a Denial of Service to the application.
Workaround:
In the meantime, users can mitigate these flaws by doing these countermeasures:
For [CVE-2010-1929 | 4048], establish a Web Application Firewall rule for limiting the length of the parameters EnteredClassID and NewClassName in POST requests to the URI /nps/servlet/webacc/.
For [CVE-2010-1930 | 4048], establish a Web Application Firewall rule for limiting the length of the parameter Tree in POST requests to the URI /nps/servlet/webacc/.
Similar rules can also be established in the Apache webserver of the iManager installation in order to mitigate these flaws.