CVE-2011-2220
Novell File Reporter Engine RECORD Tag Parsing Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in NFREngine.exe in Novell File Reporter Engine before 1.0.2.53, as used in Novell File Reporter and other products, allows remote attackers to execute arbitrary code via a crafted RECORD element.
Desbordamiento de búfer basado en pila en NFREngine.exe en Novell File Reporter Engine anterior a v1.0.2.53, como se utiliza en Novell File Reporter y otros productos, permite a atacantes remotos ejecutar código arbitrario a través de un elemento RECORD manipulado.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell File Reporter Engine. Authentication is not required to exploit this vulnerability.
The specific flaw exists within NFREngine.exe which communicates with the Agent component over HTTPS on TCP port 3035. When parsing tags inside the <RECORD> element, the application lacks a size check before pushing strings to a memcpy. An attacker can leverage this to corrupt the thread's stack. This vulnerability can result in remote code execution under the context of the SYSTEM account.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-06-02 CVE Reserved
- 2011-06-27 CVE Published
- 2024-08-06 CVE Updated
- 2024-10-27 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://download.novell.com/Download?buildid=leLxi7tQACs~ | X_refsource_confirm | |
http://securityreason.com/securityalert/8305 | Third Party Advisory | |
http://securitytracker.com/id?1025722 | Vdb Entry | |
http://www.securityfocus.com/archive/1/518632/100/0/threaded | Mailing List | |
http://www.zerodayinitiative.com/advisories/ZDI-11-227 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/45065 | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | File Reporter Engine Search vendor "Novell" for product "File Reporter Engine" | <= 1.0.2.0 Search vendor "Novell" for product "File Reporter Engine" and version " <= 1.0.2.0" | - |
Affected
| in | Novell Search vendor "Novell" | File Reporter Search vendor "Novell" for product "File Reporter" | * | - |
Affected
|