CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
97.1%
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
Vendor | Product | Version | CPE |
---|---|---|---|
novell | netware_ftp_server | 5.01i | cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.01o | cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.01w | cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.01y | cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.02b | cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.02i | cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.02r | cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.02y | cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.03b | cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:* |
novell | netware_ftp_server | 5.03l | cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:* |
secunia.com/advisories/39151
securitytracker.com/id?1023768
www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1
www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12
www.securityfocus.com/archive/1/510353/100/0/threaded
www.securityfocus.com/archive/1/510557/100/0/threaded
www.securityfocus.com/bid/39041
www.vupen.com/english/advisories/2010/0742
www.zerodayinitiative.com/advisories/ZDI-10-062
bugzilla.novell.com/show_bug.cgi?id=569496