Vulnerability Name:

CVE-2010-4227 (CCN-65625)

Assigned:2010-11-10
Published:2011-02-18
Updated:2018-10-10
Summary:The xdrDecodeString function in XNFS.NLM in Novell Netware 6.5 before SP8 allows remote attackers to cause a denial of service (abend) or execute arbitrary code via a crafted, signed value in a NFS RPC request to port UDP 1234, leading to a stack-based buffer overflow.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.8 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4227

Source: CCN
Type: Novell Web site
NetWare XNFS security updates

Source: CONFIRM
Type: Patch
http://download.novell.com/Download?buildid=1z3z-OsVCiE~

Source: CCN
Type: SA43431
Novell Netware XNFS.NLM xdrDecodeString() Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
43431

Source: SREASON
Type: UNKNOWN
8104

Source: EXPLOIT-DB
Type: Exploit
16234

Source: CCN
Type: OSVDB ID: 71408
Novell Netware XNFS.NLM xdrDecodeString() Function RPC Request Parsing Remote Overflow

Source: MISC
Type: Exploit
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=24&Itemid=24

Source: BUGTRAQ
Type: UNKNOWN
20110223 ZDI-11-090: Novell Netware RPC XNFS xdrDecodeString Remote Code Execution Vulnerability

Source: BID
Type: Exploit
46535

Source: CCN
Type: BID-46535
Novell Netware 'XNFS.NLM' Component Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1025119

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0497

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-11-090

Source: XF
Type: UNKNOWN
netware-xdrdecodestring-code-exec(65625)

Source: XF
Type: UNKNOWN
netware-xdrdecodestring-code-exec(65625)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [02-24-2011]

Source: CCN
Type: ZDI-11-090
Novell Netware RPC XNFS xdrDecodeString Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netware:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:netware:*:sp7:*:*:*:*:*:* (Version <= 6.5)

  • Configuration CCN 1:
  • cpe:/a:novell:netware:6.5:sp8:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netware 6.5
    novell netware 6.5 sp1
    novell netware 6.5 sp2
    novell netware 6.5 sp3
    novell netware 6.5 sp4
    novell netware 6.5 sp5
    novell netware 6.5 sp6
    novell netware * sp7
    novell netware 6.5 sp8