Vulnerability Name: | CVE-1999-1086 (CCN-2350) | ||||||||
Assigned: | 1999-07-15 | ||||||||
Published: | 1999-07-15 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-1999-1086 Source: BUGTRAQ Type: UNKNOWN 19990715 NMRC Advisory: Netware 5 Client Hijacking Source: CCN Type: Nomad Mobile Research Centre Advisory NMRC Advisory: Netware 5 Client Hijacking Source: CCN Type: OSVDB ID: 10921 Novell IPX NCP Fragmented IPC Packet Privilege Escalation Source: BID Type: Exploit, Patch, Vendor Advisory 528 Source: CCN Type: BID-528 Netware IPX Admin Session Spoof Vulnerability Source: XF Type: UNKNOWN netware-ipx-session-spoof(2350) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |