| Vulnerability Name: | CVE-2011-4191 (CCN-71459) | ||||||||
| Assigned: | 2011-11-23 | ||||||||
| Published: | 2011-11-23 | ||||||||
| Updated: | 2011-11-30 | ||||||||
| Summary: | Stack-based buffer overflow in the xdrDecodeString function in XNFS.NLM in Novell NetWare 6.5 SP8 allows remote attackers to execute arbitrary code or cause a denial of service (abend or NFS outage) via long packets. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2011-4191 Source: CCN Type: Novell Document ID: 5117430 NetWare XNFS security updates - Nov 2011 Source: CONFIRM Type: UNKNOWN http://download.novell.com/Download?buildid=Cfw1tDezgbw~ Source: CCN Type: SA46898 Novell NetWare XNFS.NLM "xdrDecodeString()" Buffer Overflow Vulnerability Source: CCN Type: OSVDB ID: 77316 Novell Netware XNFS.NLM xdrDecodeString() Function Datagram Parsing Remote Overflow Source: CCN Type: PRL-2012-01 Novell Netware XNFS.NLM STAT Notify Remote Code Execution Vulnerability Source: CCN Type: BID-50804 Novell Netware 'XNFS.NLM' Component 'xdrDecodeString()' Remote Buffer Overflow Vulnerability Source: CONFIRM Type: UNKNOWN https://bugzilla.novell.com/show_bug.cgi?id=671020 Source: CONFIRM Type: UNKNOWN https://bugzilla.novell.com/show_bug.cgi?id=702491 Source: XF Type: UNKNOWN netware-xdrdecodestring-bo(71459) Source: EXPLOIT-DB Type: EXPLOIT EDB-ID: 18351 Source: CCN Type: ZDI-12-007 Novell Netware XNFS.NLM STAT Notify Remote Code Execution Vulnerability | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||