| Vulnerability Name: | CVE-2010-2351 (CCN-59501) | ||||||||
| Assigned: | 2010-06-17 | ||||||||
| Published: | 2010-06-17 | ||||||||
| Updated: | 2018-10-30 | ||||||||
| Summary: | Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and earlier allows remote attackers to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.8 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
7.8 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2010-2351 Source: CCN Type: Novell Document ID: 5076512 NSS Update for NetWare 6.5 Support Pack 8 2.0 Source: CONFIRM Type: Patch http://download.novell.com/Download?buildid=tMWCI1cdI7s~ Source: CCN Type: SA40199 Novell NetWare SMB AccountName Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 40199 Source: EXPLOIT-DB Type: Exploit 13906 Source: CCN Type: OSVDB ID: 65625 Novell NetWare CIFS.NLM Session Setup AndX Packet AccountName Value Overflow Source: BID Type: Exploit 40908 Source: CCN Type: BID-40908 Novell Netware SMB Remote Buffer Overflow Vulnerability Source: CCN Type: SS-2010-006 Netware SMB Remote Stack Overflow Source: MISC Type: Exploit http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow Source: VUPEN Type: Vendor Advisory ADV-2010-1514 Source: XF Type: UNKNOWN netware-cifsnlm-bo(59501) Source: XF Type: UNKNOWN netware-cifsnlm-bo(59501) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||