CVE-2013-0804 – Novell Groupwise Client 8.0 - Multiple Remote Code Execution Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-0804
The client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via unspecified vectors. El cliente en Novell GroupWise v8.0 antes de v8.0.3 HP2 y 2012 antes de SP1 HP1 permite a atacantes remotos ejecutar código arbitrario o causas denegación de servicios (desreferenciar puntero incorrecto) por vectores sin especificar. • https://www.exploit-db.com/exploits/38250 http://www.novell.com/support/kb/doc.php?id=7011687 https://bugzilla.novell.com/show_bug.cgi?id=792535 https://www.htbridge.com/advisory/HTB23131 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2012-0439 – Novell GroupWise gwcls1.dll ActiveX Control Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2012-0439
An ActiveX control in gwcls1.dll in the client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code via (1) a pointer argument to the SetEngine method or (2) an XPItem pointer argument to an unspecified method. Un control ActiveX en gwcls1.dll en el cliente de Novell GroupWise v8.0 antes de v8.0.3 HP2 y 2012 SP1 antes de HP1 permite a atacantes remotos ejecutar código arbitrario a través de (1) un argumento puntero al método SetEngine o (2) un argumento puntero a XPItem a un método no especificado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaws exists within multiple methods exposed by gwcls1.dll. There are 20 methods which accept an XPItem pointer and perform operations on the potentially malicious pointer without validation. • https://www.exploit-db.com/exploits/24490 http://www.novell.com/support/kb/doc.php?id=7011688 http://www.zerodayinitiative.com/advisories/ZDI-13-008 https://bugzilla.novell.com/show_bug.cgi?id=712144 https://bugzilla.novell.com/show_bug.cgi?id=743674 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2012-0411 – Novell iPrint Client op-client-interface-version Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2012-0411
Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action. Una vulnerabilidad no especificada en el cliente de Novell iPrint antes de v5.82 Permite a atacantes remotos ejecutar código de su elección a través de una acción op-client-interface-version. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ienipp.ocx ActiveX object. A vulnerability exists in the op-client-interface-version operation, which takes two strings as parameters. • http://www.novell.com/support/kb/doc.php?id=7008708 •
CVE-2012-4958 – Novell File Reporter (NFR) Agent - XML Parsing Remote Code Execution
https://notcve.org/view.php?id=CVE-2012-4958
Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to read arbitrary files via a 126 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record. Una vulnerabilidad de salto de directorio en NFRAgent.exe en Novell File Reporter v1.0.2 permite cargar y ejecutar archivos a atacantes remotos a través de una petición 126 /FSF/CMD con un .. (punto punto) en un elemento FILE de un registro FSFUI. • https://www.exploit-db.com/exploits/23323 http://www.kb.cert.org/vuls/id/273371 https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2012-4956 – NFR Agent Heap Overflow
https://notcve.org/view.php?id=CVE-2012-4956
Heap-based buffer overflow in NFRAgent.exe in Novell File Reporter 1.0.2 allows remote attackers to execute arbitrary code via a large number of VOL elements in an SRS record. Una vulnerabilidad de desbordamiento de buffer basado en memoria dinámica en NFRAgent.exe en Novell File Reporter v1.0.2 permite ejecutar código de su elección a atacantes remotos a través de un numero de elementos VOL demasiado grande en un registro SRS. • http://osvdb.org/87574 http://www.kb.cert.org/vuls/id/273371 https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •