| Vulnerability Name: | CVE-2009-1639 (CCN-50609) | ||||||||
| Assigned: | 2009-05-05 | ||||||||
| Published: | 2009-05-05 | ||||||||
| Updated: | 2018-08-13 | ||||||||
| Summary: | Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Novell 4.03 allows user-assisted attackers to execute arbitrary code via a crafted .NKNT file. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.5 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2009-1639 Source: CCN Type: SA34798 Nucleus Kernel Novell ".NKNT" Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 34798 Source: CCN Type: Insight Technologies Web site Kernel recovery for Novell (Traditional volumes) v.4.03 Code Execution and DoS Source: MISC Type: Exploit http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-volumes-v-4-03-Code-Execution-and-DoS Source: MISC Type: UNKNOWN http://www.insight-tech.org/xploits/KernelrecoveryforNovell(Traditionalvolumes)v.4.03CodeExecutionandDoS.py Source: CCN Type: Nucleus Data Recovery Web site Kernel Recovery for Novell Source: BID Type: UNKNOWN 34846 Source: CCN Type: BID-34846 Nucleus Kernel Recovery for Mac and Novell Multiple Buffer Overflow Vulnerabilities Source: XF Type: UNKNOWN nucleus-novell-nknt-bo(50609) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| Vulnerability Name: | CVE-2009-1639 (CCN-50692) | ||||||||
| Assigned: | 2009-05-14 | ||||||||
| Published: | 2009-05-14 | ||||||||
| Updated: | 2009-05-14 | ||||||||
| Summary: | Novell GroupWise Internet Agent could allow a remote attacker to execute arbitrary code on the system. By sending a specially-crafted SMTP message, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with SYSTEM level privileges. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2009-1639 Source: CCN Type: SA34798 Nucleus Kernel Novell ".NKNT" Buffer Overflow Vulnerability Source: CCN Type: SA35177 Novell GroupWise Multiple Vulnerabilities Source: CCN Type: Novell Document ID: 7003272 Novell GroupWise Internet Agent (GWIA) - Security Vulnerability Processing SMTP Requests Source: CCN Type: BID-34846 Nucleus Kernel Recovery for Mac and Novell Multiple Buffer Overflow Vulnerabilities Source: CCN Type: BID-35065 Novell GroupWise Internet Agent SMTP Request Processing Buffer Overflow Vulnerability Source: XF Type: UNKNOWN gia-smtp-code-execution(50692) | ||||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||