Lucene search

K
zdiFrancis Provencher From Protek Research Lab'sZDI-12-196
HistoryDec 21, 2012 - 12:00 a.m.

Novell Groupwise GWIA ber_get_stringa Remote Code Execution Vulnerability

2012-12-2100:00:00
Francis Provencher From Protek Research Lab's
www.zerodayinitiative.com
13

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.312 Low

EPSS

Percentile

97.0%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise. Authentication is not required to exploit this vulnerability. The flaw exists within the Groupwise Internet Agent component, specifically the optional LDAP server which listens on tcp port 389. When parsing a BER encoded parameter the specified size is used to allocate a destination buffer. A properly encoded BER chunk could cause an integer size value to wrap before buffer allocation. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM account.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.312 Low

EPSS

Percentile

97.0%

Related for ZDI-12-196