9 results (0.002 seconds)

CVSS: 10.0EPSS: 43%CPEs: 1EXPL: 0

Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character. Desbordamiento de búfer basado en montículo en la Aplicación Client Trust (clntrust.exe) en el BorderManager 3.8 anterior a la actualización 1.5, permite a atacantes remotos ejecutar código de su elección a través de una petición de validación en la que el nombre de árbol Novell no está apropiadamente delimitado con el caracter-extendido de la contrabarra o un caracter NULL. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell software which utilize the Novell Client Trust. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Novell Client Trust application, clntrust.exe, which listens by default on UDP port 3024 on Novell client machines. During a validation request, the Client Trust process copies a user-supplied Novell tree name until a wide-character backslash or a NULL is encountered. • http://download.novell.com/Download?buildid=AuOWp2Xsvmc~ http://secunia.com/advisories/27468 http://securitytracker.com/id?1018882 http://www.securityfocus.com/bid/26285 http://www.vupen.com/english/advisories/2007/3682 http://www.zerodayinitiative.com/advisories/ZDI-07-064.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell BorderManager 3.5 with PAT (Port-Address Translate) enabled allows remote attackers to cause a denial of service by filling the connection table with a large number of connection requests to hosts that do not have a specific route, which may be forwarded to the public interface. • http://online.securityfocus.com/archive/1/271957 http://www.iss.net/security_center/static/9062.php http://www.securityfocus.com/bid/4726 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

RTSP proxy for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a GET request to port 9090 followed by a series of carriage returns, which causes proxy.nlm to ABEND. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9033.php http://www.securityfocus.com/bid/4698 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

FTP proxy server for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service (network connectivity loss) via a connection to port 21 with a large amount of random data. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9031.php http://www.securityfocus.com/bid/4696 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IP/IPX gateway for Novell BorderManager 3.6 SP 1a allows remote attackers to cause a denial of service via a connection to port 8225 with a large amount of random data, which causes ipipxgw.nlm to ABEND. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0060.html http://online.securityfocus.com/archive/1/271475 http://www.iss.net/security_center/static/9032.php http://www.securityfocus.com/bid/4697 •