Vulnerability Name:

CVE-2010-0625 (CCN-57308)

Assigned:2010-03-26
Published:2010-03-26
Updated:2018-10-10
Summary:Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
5.1 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-0625

Source: CCN
Type: SA39151
Novell NetWare FTP Server Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
39151

Source: CCN
Type: SECTRACK ID: 1023768
NetWare FTP Server Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1023768

Source: CCN
Type: Novell Document ID: 3238588
What fixes are in NWFTPD.NLM v5.10.01, March 26, 2010?

Source: CONFIRM
Type: UNKNOWN
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1

Source: CCN
Type: OSVDB ID: 63316
Novell NetWare NWFTPD.nlm Multiple FTP Command Handling Overflow

Source: CCN
Type: Protek Research Lab's
Novell Netware FTP Remote Stack Overflow

Source: MISC
Type: UNKNOWN
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12

Source: BUGTRAQ
Type: UNKNOWN
20100329 {PRL} Novell Netware FTP Remote Stack Overflow

Source: BUGTRAQ
Type: UNKNOWN
20100405 ZDI-10-062: Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Remote Code Execution Vulnerabilities

Source: BID
Type: UNKNOWN
39041

Source: CCN
Type: BID-39041
Novell Netware FTP Server Multiple Commands Remote Buffer Overflow Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2010-0742

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-10-062

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=569496

Source: XF
Type: UNKNOWN
netware-ftp-commands-bo(57308)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [09-07-2010]

Source: CCN
Type: ZDI-10-062
Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Remote Code Execution Vulnerabilities

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.05.04:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.06.04:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.06.05:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.07:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_ftp_server:5.07.02:*:*:*:*:*:*:*
  • AND
  • cpe:/o:novell:netware:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:5.1:sp2a:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:5.1:sp3:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:5.1:sp4:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:5.1:sp6:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.0:sp2:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.0:sp3:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp7:*:*:*:*:*:*
  • OR cpe:/o:novell:netware:6.5:sp8:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netware:6.5:sp8:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netware ftp server 5.01i
    novell netware ftp server 5.01o
    novell netware ftp server 5.01w
    novell netware ftp server 5.01y
    novell netware ftp server 5.02b
    novell netware ftp server 5.02i
    novell netware ftp server 5.02r
    novell netware ftp server 5.02y
    novell netware ftp server 5.03b
    novell netware ftp server 5.03l
    novell netware ftp server 5.04.5
    novell netware ftp server 5.04.8
    novell netware ftp server 5.04.20
    novell netware ftp server 5.04.25
    novell netware ftp server 5.05
    novell netware ftp server 5.05.04
    novell netware ftp server 5.06.04
    novell netware ftp server 5.06.05
    novell netware ftp server 5.07
    novell netware ftp server 5.07.02
    novell netware 5.1
    novell netware 5.1 sp2a
    novell netware 5.1 sp3
    novell netware 5.1 sp4
    novell netware 5.1 sp6
    novell netware 6.0
    novell netware 6.0 sp1
    novell netware 6.0 sp2
    novell netware 6.0 sp3
    novell netware 6.5
    novell netware 6.5 sp1
    novell netware 6.5 sp1.1a
    novell netware 6.5 sp1.1b
    novell netware 6.5 sp2
    novell netware 6.5 sp3
    novell netware 6.5 sp4
    novell netware 6.5 sp5
    novell netware 6.5 sp6
    novell netware 6.5 sp7
    novell netware 6.5 sp8
    novell netware 6.5 sp8