Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
http://www.vupen.com/english/advisories/2010/0742 | vdb-entry x_refsource_VUPEN |
http://www.securityfocus.com/archive/1/510557/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://secunia.com/advisories/39151 | third-party-advisory x_refsource_SECUNIA |
http://www.zerodayinitiative.com/advisories/ZDI-10-062 | x_refsource_MISC |
https://bugzilla.novell.com/show_bug.cgi?id=569496 | x_refsource_CONFIRM |
http://www.securityfocus.com/archive/1/510353/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12 | x_refsource_MISC |
http://www.securityfocus.com/bid/39041 | vdb-entry x_refsource_BID |
http://securitytracker.com/id?1023768 | vdb-entry x_refsource_SECTRACK |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM x_transferred |
http://www.vupen.com/english/advisories/2010/0742 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.securityfocus.com/archive/1/510557/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://secunia.com/advisories/39151 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.zerodayinitiative.com/advisories/ZDI-10-062 | x_refsource_MISC x_transferred |
https://bugzilla.novell.com/show_bug.cgi?id=569496 | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/archive/1/510353/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12 | x_refsource_MISC x_transferred |
http://www.securityfocus.com/bid/39041 | vdb-entry x_refsource_BID x_transferred |
http://securitytracker.com/id?1023768 | vdb-entry x_refsource_SECTRACK x_transferred |
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.5 | MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |