CVE-2010-1929 – Novell iManager - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2010-1929
Multiple stack-based buffer overflows in the jclient._Java_novell_jclient_JClient_defineClass@20 function in jclient.dll in the Tomcat web server in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allow remote authenticated users to execute arbitrary code via the (1) EnteredClassID or (2) NewClassName parameter to nps/servlet/webacc. Múltiple desbordamiento de búfer basado en pila en la función jclient._Java_novell_jclient_JClient_defineClass@20 en jclient.dll en servidor Web Tomcat en Novell iManager v2.7, v2.7.3, y v2.7.3 FTF2 permite a usuarios autenticados remotos ejecutar código de su elección a través de lso parámetros (1) EnteredClassID o (2) NewClassName sobre nps/servlet/webacc. • https://www.exploit-db.com/exploits/14010 http://secunia.com/advisories/40281 http://securitytracker.com/id?1024152 http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities http://www.exploit-db.com/exploits/14010 http://www.osvdb.org/65737 http://www.securityfocus.com/archive/1/511983/100/0/threaded http://www.securityfocus.com/bid/40480 http://www.vupen.com/english/advisories/2010/1575 https://exchange.xforce.ibmcloud.com/vulnerabilities/59694 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-2351 – Netware - SMB Remote Stack Overflow (PoC)
https://notcve.org/view.php?id=CVE-2010-2351
Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and earlier allows remote attackers to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName. Desbordamiento de búfer basado en pila en el controlador CIFS.NLM de Netware SMB v1.0 de Novell Netware v6.5 SP8 y anteriores. Permite a atacantes remotos ejecutar código de su elección a través de un paquete Sessions Setup AndX con un AccountName extenso. • https://www.exploit-db.com/exploits/13906 http://download.novell.com/Download?buildid=tMWCI1cdI7s~ http://secunia.com/advisories/40199 http://www.exploit-db.com/exploits/13906 http://www.securityfocus.com/bid/40908 http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow http://www.vupen.com/english/advisories/2010/1514 https://exchange.xforce.ibmcloud.com/vulnerabilities/59501 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-0284 – Novell Access Manager Arbitrary File Upload Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2010-0284
Directory traversal vulnerability in the getEntry method in the PortalModuleInstallManager component in a servlet in nps.jar in the Administration Console (aka Access Management Console) in Novell Access Manager 3.1 before 3.1.2-281 on Windows allows remote attackers to create arbitrary files with any contents, and consequently execute arbitrary code, via a .. (dot dot) in a parameter, aka ZDI-CAN-678. Vulnerabilidad de salto de directorio en el método getEntry en el componente PortalModuleInstallManager en un servlet en nps.jar en la Consola de administración (Administration Console, también conocida como Access Management Console) en Novell Access Manager v3.1 anteriores a v3.1.2-281 en Windows, permite a atacantes remotos crear ficheros de su elección con cualquier contenido, y consecuentemente ejecutar código de su elección a través de un .. (punto punto) en un parámetro, también conocido como ZDI-CAN-678. This vulnerability allows remote attackers to upload arbitrary files on vulnerable installations of Novell Access Manager. • http://secunia.com/advisories/40198 http://www.novell.com/support/viewContent.do?externalId=7006255&sliceId=1 http://www.securityfocus.com/bid/40931 http://www.securitytracker.com/id?1024132 http://www.vupen.com/english/advisories/2010/1516 https://exchange.xforce.ibmcloud.com/vulnerabilities/59528 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-2068 – (mod_proxy): Sensitive response disclosure due improper handling of timeouts
https://notcve.org/view.php?id=CVE-2010-2068
mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. mod_proxy_http.c en mod_proxy_http en el servidor Apache HTTP v2.2.9 hasta v2.2.15, v2.3.4-alpha, y 2.3.5-alpha en Windows, NetWare, y OS/2, en algunas configuraciones que implique grupos de trabajo proxy, no detecta de forma adecuada los "timeouts" lo que permite a atacantes remotos obtener una respuesta potencialmente sensibles, destinada a un cliente diferente en circunstancias oportunistas a través de una petición HTTP normal. • http://httpd.apache.org/security/vulnerabilities_22.html http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html http://mail-archives.apache.org/mod_mbox/httpd-announce/201006.mbox/%3C4C12933D.4060400%40apache.org%3E http://marc.info/?l=apache-announce&m=128009718610929&w=2 http://secunia.com/advisories/40206 http://secunia.com/advisories/40824 http://secunia.com/advisories/41480 http://secunia.com/advisories/41490 http://secunia.com/advisories/41722 http://securit • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2009-4879
https://notcve.org/view.php?id=CVE-2009-4879
The Identity Server in Novell Access Manager before 3.1 SP1 allows attackers with disabled Active Directory accounts to authenticate using X.509 authentication, which bypasses intended access restrictions. El servidor de identidades en Novell Access Manager anterior v3.1 SP1 permite a atacantes con cuenta Active Directory desactivada, autenticarse usando autenticación X.509, que elude las restricciones establecidas • http://www.novell.com/documentation/novellaccessmanager31/accessmanager_readme/data/accessmanager_readme.html http://www.securitytracker.com/id?1022581 • CWE-287: Improper Authentication •