CVE-2009-0410
Novell Netware Groupwise GWIA RCPT Command Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Off-by-one error in the SMTP daemon in GroupWise Internet Agent (GWIA) in Novell GroupWise 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0 allows remote attackers to execute arbitrary code via a long e-mail address in a malformed RCPT command, leading to a buffer overflow.
Error Off-by-one en el demonio SMTP en GroupWise Internet Agent (GWIA) en Novell GroupWise 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, y 8.0 que permite a los atacantes remotos ejecutar arbitrariamente código a través de una dirección larga de e-mail en un comando malformado RCPT, conduciendo a un desbordamiento de búfer.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware Groupwise SMTP daemon. Authentication is not required to exploit this vulnerability.
The specific flaw exists during the parsing of malformed RCPT verb arguments to the SMTP daemon. When an overly long e-mail address is received an off-by-one condition is triggered which minimally will cause a denial of service and can result in arbitrary code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-02-02 CVE Published
- 2009-02-03 CVE Reserved
- 2009-02-04 First Exploit
- 2024-08-07 CVE Updated
- 2024-09-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/500609/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/33560 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/7985 | 2009-02-04 |
URL | Date | SRC |
---|---|---|
http://download.novell.com/Download?buildid=GjZRRdqCFW0 | 2018-10-11 | |
http://www.zerodayinitiative.com/advisories/ZDI-09-010 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/33744 | 2018-10-11 | |
http://www.novell.com/support/viewContent.do?externalId=7002502 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 6.5 Search vendor "Novell" for product "Groupwise" and version "6.5" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 7.0 Search vendor "Novell" for product "Groupwise" and version "7.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 7.01 Search vendor "Novell" for product "Groupwise" and version "7.01" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 7.02x Search vendor "Novell" for product "Groupwise" and version "7.02x" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 7.03 Search vendor "Novell" for product "Groupwise" and version "7.03" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 7.03 Search vendor "Novell" for product "Groupwise" and version "7.03" | hp1a |
Affected
| ||||||
Novell Search vendor "Novell" | Groupwise Search vendor "Novell" for product "Groupwise" | 8.0 Search vendor "Novell" for product "Groupwise" and version "8.0" | - |
Affected
|