Vulnerability Name:

CVE-2007-3571 (CCN-35365)

Assigned:2007-06-27
Published:2007-06-27
Updated:2017-07-29
Summary:The Apache Web Server as used in Novell NetWare 6.5 and GroupWise allows remote attackers to obtain sensitive information via a certain directive to Apache that causes the HTTP-Header response to be modified, which may reveal the server's internal IP address.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2007-3571

Source: OSVDB
Type: UNKNOWN
45742

Source: CCN
Type: OSVDB ID: 45742
Apache HTTP Server on Novell Unspecified Request Directive Internal IP Disclosure

Source: VUPEN
Type: UNKNOWN
ADV-2007-2388

Source: XF
Type: UNKNOWN
novell-httpheader-information-disclosure(35365)

Source: XF
Type: UNKNOWN
novell-httpheader-information-disclosure(35365)

Source: CCN
Type: Novell Security Alert Document ID: 3555327
Potential Security Vulnerability with Apache on NetWare 6.5

Source: CONFIRM
Type: UNKNOWN
https://secure-support.novell.com/KanisaPlatform/Publishing/370/3555327_f.SAL_Public.html

Vulnerable Configuration:Configuration 1:
  • cpe:/o:novell:netware:6.5:*:*:*:*:*:*:*
  • AND
  • cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:sp1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netware 6.5
    novell groupwise 6.0
    novell groupwise 6.0 sp1
    novell groupwise 6.0 sp2
    novell groupwise 6.0 sp3
    novell groupwise 6.0 sp4
    novell groupwise 6.0.1 sp1
    novell groupwise 6.5
    novell groupwise 6.5 sp1
    novell groupwise 6.5 sp2
    novell groupwise 6.5 sp3
    novell groupwise 6.5 sp4
    novell groupwise 6.5 sp5
    novell groupwise 6.5 sp6
    novell groupwise 6.5.2
    novell groupwise 6.5.3
    novell groupwise 6.5.4
    novell groupwise 7.0
    novell groupwise 7.0 sp1
    novell groupwise 6.0
    novell groupwise 6.0.1 sp1
    novell groupwise 6.5
    novell netware 6.5
    novell groupwise 6.5.2
    novell groupwise 6.5.3
    novell groupwise 7.0
    novell groupwise 6.5.4
    novell groupwise 6.5 sp1
    novell groupwise 6.5 sp2
    novell groupwise 6.5 sp3
    novell groupwise 6.5 sp4
    novell groupwise 6.5 sp5
    novell groupwise 6.5 sp6
    novell groupwise 7.0 sp1
    novell groupwise 6.0 sp4
    novell groupwise 6.0 sp3
    novell groupwise 6.0 sp2
    novell groupwise 6.0 sp1