13 results (0.010 seconds)

CVSS: 10.0EPSS: 43%CPEs: 1EXPL: 0

Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character. Desbordamiento de búfer basado en montículo en la Aplicación Client Trust (clntrust.exe) en el BorderManager 3.8 anterior a la actualización 1.5, permite a atacantes remotos ejecutar código de su elección a través de una petición de validación en la que el nombre de árbol Novell no está apropiadamente delimitado con el caracter-extendido de la contrabarra o un caracter NULL. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell software which utilize the Novell Client Trust. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Novell Client Trust application, clntrust.exe, which listens by default on UDP port 3024 on Novell client machines. During a validation request, the Client Trust process copies a user-supplied Novell tree name until a wide-character backslash or a NULL is encountered. • http://download.novell.com/Download?buildid=AuOWp2Xsvmc~ http://secunia.com/advisories/27468 http://securitytracker.com/id?1018882 http://www.securityfocus.com/bid/26285 http://www.vupen.com/english/advisories/2007/3682 http://www.zerodayinitiative.com/advisories/ZDI-07-064.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 0

Novell BorderManager 3.8 SP4 generates the same ISAKMP cookies for the same source IP and port number during the same day, which allows remote attackers to conduct denial of service and replay attacks. NOTE: this issue might be related to CVE-2006-5286. Novell BorderManager 3.8 SP4 genera las mismas cookies ISAKMP para la misma IP fuente y número de puerto durante el mismo día, lo cual permite a atacantes remotos conducir denegaciones de servicio y ataques de respuesta. NOTA: esta vulnerabilidad podría estar referida a CVE-2006-5286. • http://secunia.com/advisories/22699 http://securitytracker.com/id?1017213 http://www.attrition.org/pipermail/vim/2007-March/001410.html http://www.osvdb.org/30338 http://www.securityfocus.com/bid/21014 http://www.vupen.com/english/advisories/2006/4471 https://exchange.xforce.ibmcloud.com/vulnerabilities/30218 https://secure-support.novell.com/KanisaPlatform/Publishing/201/3003139_f.SAL_Public.html •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in IKE.NLM in Novell BorderManager 3.8 allows attackers to cause a denial of service (crash) via unknown attack vectors related to "VPN issues" for certain "IKE and IPsec settings." Vulnerabilidad no especificada en IKE.NLM en Novell BorderManager 3.8 permite a un atacante remoto provocar denegación de servicio (caida) a través de un ataque desconocido de vectores realciones con "asunto VPN" para ciertas "configuraciones IKE y IPsec". • http://secunia.com/advisories/22355 http://securitytracker.com/id?1017025 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm http://www.securityfocus.com/bid/20428 http://www.vupen.com/english/advisories/2006/3998 https://exchange.xforce.ibmcloud.com/vulnerabilities/29447 •

CVSS: 5.0EPSS: 4%CPEs: 2EXPL: 0

Unspecified vulnerability in the HTTP proxy in Novell BorderManager 3.8 and earlier allows remote attackers to cause a denial of service (CPU consumption and ABEND) via unknown attack vectors related to "media streaming over HTTP 1.1". • http://secunia.com/advisories/19163 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972993.htm http://www.osvdb.org/23752 http://www.securityfocus.com/bid/17031 http://www.vupen.com/english/advisories/2006/0879 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

The Virtual Private Network (VPN) capability in Novell Bordermanager 3.8 allows remote attackers to cause a denial of service (ABEND in IKE.NLM) via a malformed IKE packet, as sent by the Striker ISAKMP Protocol Test Suite. • http://secunia.com/advisories/12067 http://support.novell.com/cgi-bin/search/searchtid.cgi?/10093576.htm http://www.kb.cert.org/vuls/id/432097 http://www.securityfocus.com/bid/10727 https://exchange.xforce.ibmcloud.com/vulnerabilities/16697 •