CVE-2007-1350
Novell Netmail WebAdmin Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in webadmin.exe in Novell NetMail 3.5.2 allows remote attackers to execute arbitrary code via a long username during HTTP Basic authentication.
Desbordamiento basado en pila en el webadmin.exe del Novell NetMail 3.5.2 permite a atacantes remotos ejecutar código de su elección mediante un nombre de usuario largo durante la autenticación HTTP Básica.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell NetMail. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the webadmin.exe process bound by default on TCP port 89. During HTTP Basic authentication, a long username of at least 213 bytes will trigger a stack based buffer overflow due to a vulnerable sprintf() call. Exploitation of this issue can result in arbitrary code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-03-07 CVE Reserved
- 2007-03-07 CVE Published
- 2024-05-03 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/24445 | Third Party Advisory | |
http://securityreason.com/securityalert/2395 | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/919369 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/462154/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1017734 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/0870 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32861 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://download.novell.com/Download?buildid=sMYRODW09pw | 2018-10-16 | |
http://www.securityfocus.com/bid/22857 | 2018-10-16 |
URL | Date | SRC |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-07-009.html | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | a |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | b |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | c |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | c1 |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | d |
Affected
| ||||||
Novell Search vendor "Novell" | Netmail Search vendor "Novell" for product "Netmail" | 3.5.2 Search vendor "Novell" for product "Netmail" and version "3.5.2" | e-ftfl |
Affected
|