CVE-2007-5767
Novell Client Trust Heap Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character.
Desbordamiento de búfer basado en montículo en la Aplicación Client Trust (clntrust.exe) en el BorderManager 3.8 anterior a la actualización 1.5, permite a atacantes remotos ejecutar código de su elección a través de una petición de validación en la que el nombre de árbol Novell no está apropiadamente delimitado con el caracter-extendido de la contrabarra o un caracter NULL.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell software which utilize the Novell Client Trust. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the Novell Client Trust application, clntrust.exe, which listens by default on UDP port 3024 on Novell client machines. During a validation request, the Client Trust process copies a user-supplied Novell tree name until a wide-character backslash or a NULL is encountered. If neither is found within the data, the process will copy excess data which later overflows a static buffer during a call to wsprintfA.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-10-31 CVE Reserved
- 2007-10-31 CVE Published
- 2024-07-29 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1018882 | Vdb Entry | |
http://www.securityfocus.com/bid/26285 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/3682 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-07-064.html | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://download.novell.com/Download?buildid=AuOWp2Xsvmc~ | 2011-03-08 | |
http://secunia.com/advisories/27468 | 2011-03-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Bordermanager Search vendor "Novell" for product "Bordermanager" | <= 3.8 Search vendor "Novell" for product "Bordermanager" and version " <= 3.8" | - |
Affected
|