6 results (0.007 seconds)

CVSS: 10.0EPSS: 43%CPEs: 1EXPL: 0

Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character. Desbordamiento de búfer basado en montículo en la Aplicación Client Trust (clntrust.exe) en el BorderManager 3.8 anterior a la actualización 1.5, permite a atacantes remotos ejecutar código de su elección a través de una petición de validación en la que el nombre de árbol Novell no está apropiadamente delimitado con el caracter-extendido de la contrabarra o un caracter NULL. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell software which utilize the Novell Client Trust. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Novell Client Trust application, clntrust.exe, which listens by default on UDP port 3024 on Novell client machines. During a validation request, the Client Trust process copies a user-supplied Novell tree name until a wide-character backslash or a NULL is encountered. • http://download.novell.com/Download?buildid=AuOWp2Xsvmc~ http://secunia.com/advisories/27468 http://securitytracker.com/id?1018882 http://www.securityfocus.com/bid/26285 http://www.vupen.com/english/advisories/2007/3682 http://www.zerodayinitiative.com/advisories/ZDI-07-064.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Novell BorderManager 3.5 with PAT (Port-Address Translate) enabled allows remote attackers to cause a denial of service by filling the connection table with a large number of connection requests to hosts that do not have a specific route, which may be forwarded to the public interface. • http://online.securityfocus.com/archive/1/271957 http://www.iss.net/security_center/static/9062.php http://www.securityfocus.com/bid/4726 •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 2

Remote attackers can cause a denial of service in Novell BorderManager 3.6 and earlier by sending TCP SYN flood to port 353. • https://www.exploit-db.com/exploits/264 http://archives.neohapsis.com/archives/bugtraq/2001-05/0000.html http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html http://marc.info/?l=bugtraq&m=98779821207867&w=2 http://marc.info/?l=bugtraq&m=98865027328391&w=2 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm http://www.securityfocus.com/bid/2623 https://exchange.xforce.ibmcloud.com/vulnerabilities/6429 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

The ClientTrust program in Novell BorderManager does not properly verify the origin of authentication requests, which could allow remote attackers to impersonate another user by replaying the authentication requests and responses from port 3024 of the victim's machine. • http://www.securityfocus.com/bid/1440 http://www.securityfocus.com/templates/archive.pike?list=1&msg=06256915.00591E18.00%40uprrsmtp2.notes.up.com https://exchange.xforce.ibmcloud.com/vulnerabilities/5186 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Novell BorderManager 3.0 and 3.5 allows remote attackers to bypass URL filtering by encoding characters in the requested URL. • http://archives.neohapsis.com/archives/bugtraq/2000-07/0038.html http://www.securityfocus.com/bid/1432 •