Vulnerability Name:

CVE-2011-2220 (CCN-68251)

Assigned:2011-06-27
Published:2011-06-27
Updated:2018-10-09
Summary:Stack-based buffer overflow in NFREngine.exe in Novell File Reporter Engine before 1.0.2.53, as used in Novell File Reporter and other products, allows remote attackers to execute arbitrary code via a crafted RECORD element.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2011-2220

Source: CCN
Type: Novell Web site
Novell File Reporter Engine Security Patch 1.0.2.53

Source: CONFIRM
Type: UNKNOWN
http://download.novell.com/Download?buildid=leLxi7tQACs~

Source: CCN
Type: SA45065
Novell File Reporter Engine RECORD Element Processing Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
45065

Source: SREASON
Type: UNKNOWN
8305

Source: SECTRACK
Type: UNKNOWN
1025722

Source: CCN
Type: OSVDB ID: 73494
Novell File Reporter Engine RECORD Element Tag Parsing Overflow

Source: BUGTRAQ
Type: UNKNOWN
20110627 ZDI-11-227: Novell File Reporter Engine RECORD Tag Parsing Remote Code Execution Vulnerability

Source: CCN
Type: BID-48470
Novell File Reporter Engine 'RECORD' Tag Remote Code Execution Vulnerability

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-11-227

Source: XF
Type: UNKNOWN
filereporter-nfrengine-bo(68251)

Source: CCN
Type: ZDI-11-227
Novell File Reporter Engine RECORD Tag Parsing Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:file_reporter_engine:*:*:*:*:*:*:*:* (Version <= 1.0.2.0)
  • AND
  • cpe:/a:novell:file_reporter:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:file_reporter:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:file_reporter:1.0.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell file reporter engine *
    novell file reporter *
    novell file reporter 1.0.2
    novell file reporter 1.0.1