Vulnerability Name:

CVE-2009-1639 (CCN-50609)

Assigned:2009-05-05
Published:2009-05-05
Updated:2018-08-13
Summary:Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Novell 4.03 allows user-assisted attackers to execute arbitrary code via a crafted .NKNT file.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.5 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-1639

Source: CCN
Type: SA34798
Nucleus Kernel Novell ".NKNT" Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
34798

Source: CCN
Type: Insight Technologies Web site
Kernel recovery for Novell (Traditional volumes) v.4.03 Code Execution and DoS

Source: MISC
Type: Exploit
http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-volumes-v-4-03-Code-Execution-and-DoS

Source: MISC
Type: UNKNOWN
http://www.insight-tech.org/xploits/KernelrecoveryforNovell(Traditionalvolumes)v.4.03CodeExecutionandDoS.py

Source: CCN
Type: Nucleus Data Recovery Web site
Kernel Recovery for Novell

Source: BID
Type: UNKNOWN
34846

Source: CCN
Type: BID-34846
Nucleus Kernel Recovery for Mac and Novell Multiple Buffer Overflow Vulnerabilities

Source: XF
Type: UNKNOWN
nucleus-novell-nknt-bo(50609)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nucleustechnologies:kernel_recovery:4.03:novell:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2009-1639 (CCN-50692)

    Assigned:2009-05-14
    Published:2009-05-14
    Updated:2009-05-14
    Summary:Novell GroupWise Internet Agent could allow a remote attacker to execute arbitrary code on the system. By sending a specially-crafted SMTP message, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with SYSTEM level privileges.
    CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
    6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2009-1639

    Source: CCN
    Type: SA34798
    Nucleus Kernel Novell ".NKNT" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA35177
    Novell GroupWise Multiple Vulnerabilities

    Source: CCN
    Type: Novell Document ID: 7003272
    Novell GroupWise Internet Agent (GWIA) - Security Vulnerability Processing SMTP Requests

    Source: CCN
    Type: BID-34846
    Nucleus Kernel Recovery for Mac and Novell Multiple Buffer Overflow Vulnerabilities

    Source: CCN
    Type: BID-35065
    Novell GroupWise Internet Agent SMTP Request Processing Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    gia-smtp-code-execution(50692)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.02:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.01:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.03:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.03:hp1a:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    nucleustechnologies kernel recovery 4.03 novell
    novell groupwise 7.0
    novell groupwise 7.02
    novell groupwise 7.01
    novell groupwise 7.0 sp3
    novell groupwise 7.0 sp2
    novell groupwise 7.0 sp1
    novell groupwise 7.03
    novell groupwise 8.0
    novell groupwise 7.03 hp1a
    novell groupwise 8.0 hp1