Vulnerabilites related to novell - netware_ftp_server
cve-2005-4887
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 16:43
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=133977 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4887", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=133977", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4887", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T16:43:38.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2434
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 20:27
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.02i in the FTP server in Novell NetWare does not properly listen for data connections, which allows remote attackers to cause a denial of service (abend) via multiple FTP sessions.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:53.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.02i in the FTP server in Novell NetWare does not properly listen for data connections, which allows remote attackers to cause a denial of service (abend) via multiple FTP sessions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.02i in the FTP server in Novell NetWare does not properly listen for data connections, which allows remote attackers to cause a denial of service (abend) via multiple FTP sessions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2434", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T20:27:54.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2432
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 18:04
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (abend) via a crafted username.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:53.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (abend) via a crafted username." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (abend) via a crafted username." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2432", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T18:04:18.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1592
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 20:26
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 allow remote attackers to cause a denial of service (abend) via a long (1) username or (2) password.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.072Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 allow remote attackers to cause a denial of service (abend) via a long (1) username or (2) password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1592", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 allow remote attackers to cause a denial of service (abend) via a long (1) username or (2) password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1592", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T20:26:30.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1596
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 19:51
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1596", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1596", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T19:51:36.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1322
Vulnerability from cvelistv5
Published
2006-03-20 22:00
Modified
2024-08-07 17:03
Severity ?
EPSS score ?
Summary
Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/0975 | vdb-entry, x_refsource_VUPEN | |
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm | x_refsource_CONFIRM | |
http://www.osvdb.org/23949 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1015781 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/17137 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25289 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/19265 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:03:28.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-0975", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0975" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm" }, { "name": "23949", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23949" }, { "name": "1015781", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015781" }, { "name": "17137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17137" }, { "name": "netware-nwftpd-mdtm-dos(25289)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25289" }, { "name": "19265", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19265" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-0975", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0975" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm" }, { "name": "23949", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23949" }, { "name": "1015781", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015781" }, { "name": "17137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17137" }, { "name": "netware-nwftpd-mdtm-dos(25289)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25289" }, { "name": "19265", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19265" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-0975", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0975" }, { "name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm", "refsource": "CONFIRM", "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm" }, { "name": "23949", "refsource": "OSVDB", "url": "http://www.osvdb.org/23949" }, { "name": "1015781", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015781" }, { "name": "17137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17137" }, { "name": "netware-nwftpd-mdtm-dos(25289)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25289" }, { "name": "19265", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19265" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1322", "datePublished": "2006-03-20T22:00:00", "dateReserved": "2006-03-20T00:00:00", "dateUpdated": "2024-08-07T17:03:28.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1245
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-17 00:05
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allow remote attackers to bypass intended restrictions on anonymous access via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:53:28.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2000-1245", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:37:49.712788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:39:06.226Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allow remote attackers to bypass intended restrictions on anonymous access via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1245", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allow remote attackers to bypass intended restrictions on anonymous access via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1245", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-17T00:05:49.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-2433
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 21:04
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote authenticated users to cause a denial of service (abend) via a crafted ABOR command.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:54.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote authenticated users to cause a denial of service (abend) via a crafted ABOR command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote authenticated users to cause a denial of service (abend) via a crafted ABOR command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2433", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T21:04:32.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1593
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 20:36
Severity ?
EPSS score ?
Summary
NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 does not enforce domain-name login restrictions, which allows remote attackers to bypass intended access control via an FTP connection.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:16.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 does not enforce domain-name login restrictions, which allows remote attackers to bypass intended access control via an FTP connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1593", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 does not enforce domain-name login restrictions, which allows remote attackers to bypass intended access control via an FTP connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1593", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T20:36:53.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0625
Vulnerability from cvelistv5
Published
2010-04-05 16:00
Modified
2024-08-07 00:52
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2010/0742 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/510557/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/39151 | third-party-advisory, x_refsource_SECUNIA | |
http://www.zerodayinitiative.com/advisories/ZDI-10-062 | x_refsource_MISC | |
https://bugzilla.novell.com/show_bug.cgi?id=569496 | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/510353/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12 | x_refsource_MISC | |
http://www.securityfocus.com/bid/39041 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1023768 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:19.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "ADV-2010-0742", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0742" }, { "name": "20100405 ZDI-10-062: Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/510557/100/0/threaded" }, { "name": "39151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39151" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=569496" }, { "name": "20100329 {PRL} Novell Netware FTP Remote Stack Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/510353/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=12\u0026Itemid=12" }, { "name": "39041", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39041" }, { "name": "1023768", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023768" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "ADV-2010-0742", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0742" }, { "name": "20100405 ZDI-10-062: Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/510557/100/0/threaded" }, { "name": "39151", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39151" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=569496" }, { "name": "20100329 {PRL} Novell Netware FTP Remote Stack Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/510353/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=12\u0026Itemid=12" }, { "name": "39041", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39041" }, { "name": "1023768", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023768" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "ADV-2010-0742", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0742" }, { "name": "20100405 ZDI-10-062: Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Remote Code Execution Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/510557/100/0/threaded" }, { "name": "39151", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39151" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-062", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-062" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=569496", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=569496" }, { "name": "20100329 {PRL} Novell Netware FTP Remote Stack Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/510353/100/0/threaded" }, { "name": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=12\u0026Itemid=12", "refsource": "MISC", "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=12\u0026Itemid=12" }, { "name": "39041", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39041" }, { "name": "1023768", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023768" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0625", "datePublished": "2010-04-05T16:00:00", "dateReserved": "2010-02-11T00:00:00", "dateUpdated": "2024-08-07T00:52:19.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1594
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 23:06
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly enforce FTPREST.TXT settings, which allows remote attackers to bypass intended access restrictions via an FTP session.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly enforce FTPREST.TXT settings, which allows remote attackers to bypass intended access restrictions via an FTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly enforce FTPREST.TXT settings, which allows remote attackers to bypass intended access restrictions via an FTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1594", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T23:06:31.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6734
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 20:17
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.08.07 in the FTP server in Novell NetWare 6.5 SP7 does not properly implement the FTPREST.TXT NOREMOTE restriction, which allows remote authenticated users to access directories outside of the home server via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=272093 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:18:20.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=272093" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.08.07 in the FTP server in Novell NetWare 6.5 SP7 does not properly implement the FTPREST.TXT NOREMOTE restriction, which allows remote authenticated users to access directories outside of the home server via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=272093" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6734", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.08.07 in the FTP server in Novell NetWare 6.5 SP7 does not properly implement the FTPREST.TXT NOREMOTE restriction, which allows remote authenticated users to access directories outside of the home server via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=272093", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=272093" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6734", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T20:17:18.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4888
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-17 02:07
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.06.04 in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (excessive stale connections) by establishing many FTP sessions, which persist in the Not-Logged-In state after each session is completed.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=97819 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=97819" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.06.04 in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (excessive stale connections) by establishing many FTP sessions, which persist in the Not-Logged-In state after each session is completed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=97819" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4888", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.06.04 in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (excessive stale connections) by establishing many FTP sessions, which persist in the Not-Logged-In state after each session is completed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=97819", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=97819" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4888", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-17T02:07:16.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2767
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 22:14
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:36:25.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2767", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2767", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T22:14:56.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1246
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 16:19
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allows remote authenticated users to cause a denial of service (abend) by sending an RNTO command after a failed RNFR command.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:53:28.309Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allows remote authenticated users to cause a denial of service (abend) by sending an RNTO command after a failed RNFR command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allows remote authenticated users to cause a denial of service (abend) by sending an RNTO command after a failed RNFR command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1246", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T16:19:05.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6735
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 20:11
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.08.06 in the FTP server in Novell NetWare does not properly handle partial matches for container names in the FTPREST.TXT file, which allows remote attackers to bypass intended access restrictions via an FTP session.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM | |
https://bugzilla.novell.com/show_bug.cgi?id=260459 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:18:20.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=260459" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.08.06 in the FTP server in Novell NetWare does not properly handle partial matches for container names in the FTPREST.TXT file, which allows remote attackers to bypass intended access restrictions via an FTP session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=260459" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.08.06 in the FTP server in Novell NetWare does not properly handle partial matches for container names in the FTPREST.TXT file, which allows remote attackers to bypass intended access restrictions via an FTP session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=260459", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=260459" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6735", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T20:11:26.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1595
Vulnerability from cvelistv5
Published
2010-04-05 15:15
Modified
2024-09-16 23:11
Severity ?
EPSS score ?
Summary
NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly perform "intruder detection," which has unspecified impact and attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly perform \"intruder detection,\" which has unspecified impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-05T15:15:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly perform \"intruder detection,\" which has unspecified impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1", "refsource": "CONFIRM", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1595", "datePublished": "2010-04-05T15:15:00Z", "dateReserved": "2010-04-05T00:00:00Z", "dateUpdated": "2024-09-16T23:11:32.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-21 00:05
Severity ?
Summary
NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.01o | |
novell | netware_ftp_server | 5.01w | |
novell | netware_ftp_server | 5.01y | |
novell | netware_ftp_server | 5.02b | |
novell | netware_ftp_server | 5.02i | |
novell | netware_ftp_server | 5.02r | |
novell | netware_ftp_server | 5.02y | |
novell | netware_ftp_server | 5.03b | |
novell | netware_ftp_server | 5.03l | |
novell | netware_ftp_server | 5.04.5 | |
novell | netware_ftp_server | 5.04.8 | |
novell | netware_ftp_server | 5.04.20 | |
novell | netware_ftp_server | 5.04.25 | |
novell | netware_ftp_server | 5.05 | |
novell | netware_ftp_server | 5.05.04 | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "A156D9A9-8404-4236-90DB-2CE703C2D3DC", "versionEndIncluding": "5.06.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*", "matchCriteriaId": "E4304B8D-E271-41C6-9D84-E71AA3D683E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:*", "matchCriteriaId": "0CA8CA21-1E2A-44CA-A21B-A74EA6BA81FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:*", "matchCriteriaId": "8519850A-56CB-4C6A-9E87-09F71281E20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:*", "matchCriteriaId": "069FC929-2FEF-44BA-AAEC-A795AF724B61", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:*", "matchCriteriaId": "24F12F0B-0439-4301-8767-A6F36097649A", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:*", "matchCriteriaId": "B8131B93-3147-4988-9193-19629C933D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:*", "matchCriteriaId": "58B67AD9-BE51-4B7C-AE9E-1D15AB70BA0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:*", "matchCriteriaId": "1F6C2582-0C8E-4743-82B1-51AF53AE3879", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.05.04:*:*:*:*:*:*:*", "matchCriteriaId": "B387DDA6-FF1B-48D6-85AF-EB1221CF47DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.5:sp5:*:*:*:*:*:*", "matchCriteriaId": "0F7A41C8-4332-4F8C-A297-6850C05B3EB6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.06.05 para el servidor FTP de Novell NetWare v6.5 SP5 permite a los atacantes tener un impacto no especificado a trav\u00e9s de vectores relacionados con las contrase\u00f1as -passwords-." } ], "id": "CVE-2005-4887", "lastModified": "2024-11-21T00:05:25.250", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.827", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-21 00:40
Severity ?
Summary
NWFTPD.nlm before 5.08.06 in the FTP server in Novell NetWare does not properly handle partial matches for container names in the FTPREST.TXT file, which allows remote attackers to bypass intended access restrictions via an FTP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF45C68A-5F83-4090-A0C1-A09EC2987706", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.08.06 in the FTP server in Novell NetWare does not properly handle partial matches for container names in the FTPREST.TXT file, which allows remote attackers to bypass intended access restrictions via an FTP session." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.08.06 en el servidor FTP en Novell NetWare no maneja adecuadamente las coincidencias parciales para los nombres de contenedor en el archivo FTPREST.TXT, lo que permite a atacantes remotos evitar las restricciones de acceso establecidas a trav\u00e9s de una sesi\u00f3n FTP." } ], "id": "CVE-2007-6735", "lastModified": "2024-11-21T00:40:53.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.967", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=260459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=260459" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:43
Severity ?
Summary
NWFTPD.nlm before 5.02i in the FTP server in Novell NetWare does not properly listen for data connections, which allows remote attackers to cause a denial of service (abend) via multiple FTP sessions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.01i | |
novell | netware_ftp_server | 5.01o | |
novell | netware_ftp_server | 5.01w | |
novell | netware_ftp_server | 5.01y | |
novell | netware | 5.1 | |
novell | netware | 6.0 | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D78B88A8-7B95-4CE3-8DDD-281C77269649", "versionEndIncluding": "5.02b", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "matchCriteriaId": "2093B36D-EBE4-4B12-A44B-F06929B828BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "455ED4E4-8033-4043-BF10-20188BF0B8B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.02i in the FTP server in Novell NetWare does not properly listen for data connections, which allows remote attackers to cause a denial of service (abend) via multiple FTP sessions." }, { "lang": "es", "value": "El fichero NWFTPD.nlm antes su version v5.02i en el servidor FTP de Novell NetWare no escucha adecuadamente las conexiones de datos, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de m\u00faltiples sesiones de FTP." } ], "id": "CVE-2002-2434", "lastModified": "2024-11-20T23:43:40.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.627", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-21 00:05
Severity ?
Summary
NWFTPD.nlm before 5.06.04 in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (excessive stale connections) by establishing many FTP sessions, which persist in the Not-Logged-In state after each session is completed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF45C68A-5F83-4090-A0C1-A09EC2987706", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.06.04 in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (excessive stale connections) by establishing many FTP sessions, which persist in the Not-Logged-In state after each session is completed." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.06.04 en el servidor FTP en Novell NetWare, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (Conexiones pasadas excesivas) estableciendo varias sesiones FTP, que persisten en el estado Not-Logged-In despu\u00e9s de que cada sesi\u00f3n es completada." } ], "id": "CVE-2005-4888", "lastModified": "2024-11-21T00:05:25.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.890", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=97819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=97819" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:47
Severity ?
Summary
NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly enforce FTPREST.TXT settings, which allows remote attackers to bypass intended access restrictions via an FTP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly enforce FTPREST.TXT settings, which allows remote attackers to bypass intended access restrictions via an FTP session." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.04.05 del servidor FTP de Novell NetWare v6.5 no fuerza adecuadamente a que se cumplan las restricciones de FTPREST.TXT, esto permite a atacantes remotos evitar las restricciones de acceso pretendidas mediante una sesi\u00f3n FTP." } ], "id": "CVE-2003-1594", "lastModified": "2024-11-20T23:47:31.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.717", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:47
Severity ?
Summary
NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 does not enforce domain-name login restrictions, which allows remote attackers to bypass intended access control via an FTP connection.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B04B18E8-A130-4BAA-8BBC-D9DF7085F9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "B9700BC2-BE56-448F-BAE6-AD01F71DC646", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "FE91855A-062B-47D7-BC38-5980E3F6F2FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 does not enforce domain-name login restrictions, which allows remote attackers to bypass intended access control via an FTP connection." }, { "lang": "es", "value": "NWFTPD.nlm en el servidor FTP en Novell NetWare v6.0 anterior a SP4 y v6.5 anterior a SP1 no refuerza las restricciones de login domain-name, lo que permite a atacantes remotos evitar el control de acceso establecido a trav\u00e9s de una conexi\u00f3n FTP." } ], "id": "CVE-2003-1593", "lastModified": "2024-11-20T23:47:31.560", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.703", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:47
Severity ?
Summary
NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.01i | |
novell | netware_ftp_server | 5.01o | |
novell | netware_ftp_server | 5.01w | |
novell | netware_ftp_server | 5.01y | |
novell | netware_ftp_server | 5.02b | |
novell | netware_ftp_server | 5.02i | |
novell | netware_ftp_server | 5.02r | |
novell | netware_ftp_server | 5.02y | |
novell | netware | 5.1 | |
novell | netware | 6.0 | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "8545920B-3265-4261-A6B5-E327F67D37A9", "versionEndIncluding": "5.03b", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "matchCriteriaId": "2093B36D-EBE4-4B12-A44B-F06929B828BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*", "matchCriteriaId": "E4304B8D-E271-41C6-9D84-E71AA3D683E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "455ED4E4-8033-4043-BF10-20188BF0B8B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.03.12 del servidor FTP de Novell NetWare no restringe adecuadamente el uso de los ficheros de sistema por usuarios an\u00f3nimos con directorios ra\u00edz NFS Gateway, esto permite a atacantes remotos evitar las restricciones de acceso pretendidas mediante sesiones FTP." } ], "id": "CVE-2003-1596", "lastModified": "2024-11-20T23:47:31.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.780", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:43
Severity ?
Summary
NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote authenticated users to cause a denial of service (abend) via a crafted ABOR command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.01i | |
novell | netware_ftp_server | 5.01o | |
novell | netware_ftp_server | 5.01w | |
novell | netware_ftp_server | 5.01y | |
novell | netware_ftp_server | 5.02b | |
novell | netware_ftp_server | 5.02i | |
novell | netware_ftp_server | 5.02r | |
novell | netware | 5.1 | |
novell | netware | 6.0 | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2DB9D60-93E9-4602-A3FA-1A87D841C86D", "versionEndIncluding": "5.02y", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "matchCriteriaId": "2093B36D-EBE4-4B12-A44B-F06929B828BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "455ED4E4-8033-4043-BF10-20188BF0B8B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote authenticated users to cause a denial of service (abend) via a crafted ABOR command." }, { "lang": "es", "value": "El fichero NWFTPD.nlm antes de su versi\u00f3n v5.03b en el servidor FTP de Novell NetWare permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio a trav\u00e9s de un comando ARBOR debidamente modificado." } ], "id": "CVE-2002-2433", "lastModified": "2024-11-20T23:43:40.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.593", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-21 00:40
Severity ?
Summary
NWFTPD.nlm before 5.08.07 in the FTP server in Novell NetWare 6.5 SP7 does not properly implement the FTPREST.TXT NOREMOTE restriction, which allows remote authenticated users to access directories outside of the home server via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.5:sp7:*:*:*:*:*:*", "matchCriteriaId": "CF0FC43C-4041-49B4-87AD-63D7BE17136D", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.08.07 in the FTP server in Novell NetWare 6.5 SP7 does not properly implement the FTPREST.TXT NOREMOTE restriction, which allows remote authenticated users to access directories outside of the home server via unspecified vectors." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.08.07 en el servidor FTP de Novell NetWare v6.5 SP7 no implementa adecuadamente la restricci\u00f3n FTPREST.TXT NOREMOTE, lo que permite a usuarios autenticados en remoto, empleando vectores no especificados, acceder a directorios fuera del servidor que lo aloja." } ], "id": "CVE-2007-6734", "lastModified": "2024-11-21T00:40:52.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.937", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=272093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=272093" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 16:30
Modified
2024-11-21 01:12
Severity ?
Summary
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "matchCriteriaId": "2093B36D-EBE4-4B12-A44B-F06929B828BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*", "matchCriteriaId": "E4304B8D-E271-41C6-9D84-E71AA3D683E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:*", "matchCriteriaId": "0CA8CA21-1E2A-44CA-A21B-A74EA6BA81FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:*", "matchCriteriaId": "8519850A-56CB-4C6A-9E87-09F71281E20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:*", "matchCriteriaId": "069FC929-2FEF-44BA-AAEC-A795AF724B61", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:*", "matchCriteriaId": "24F12F0B-0439-4301-8767-A6F36097649A", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:*", "matchCriteriaId": "B8131B93-3147-4988-9193-19629C933D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:*", "matchCriteriaId": "58B67AD9-BE51-4B7C-AE9E-1D15AB70BA0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:*", "matchCriteriaId": "1F6C2582-0C8E-4743-82B1-51AF53AE3879", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.05.04:*:*:*:*:*:*:*", "matchCriteriaId": "B387DDA6-FF1B-48D6-85AF-EB1221CF47DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.06.04:*:*:*:*:*:*:*", "matchCriteriaId": "0B9A6A85-0ECA-484D-899B-F9417B09D74A", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.06.05:*:*:*:*:*:*:*", "matchCriteriaId": "D7211C6A-B9A5-450C-81ED-5A22785617E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.07:*:*:*:*:*:*:*", "matchCriteriaId": "EACC687E-DB67-4836-88F8-D2A371EEDB0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.07.02:*:*:*:*:*:*:*", "matchCriteriaId": "E47D3FD1-1972-4E82-92AC-51CA2EED8B3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "455ED4E4-8033-4043-BF10-20188BF0B8B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:5.1:sp2a:*:*:*:*:*:*", "matchCriteriaId": "081C8B07-AB0F-43B4-8677-ABFBD315BB6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:5.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "A06A23FD-5CEB-4737-9478-6C50E635E71B", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:5.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E71EBA85-5816-4A69-A5DE-EEBD25265CE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:5.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "D2DA7621-8953-4B7D-8AAC-33C2E3C51719", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B04B18E8-A130-4BAA-8BBC-D9DF7085F9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "B9700BC2-BE56-448F-BAE6-AD01F71DC646", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "FE91855A-062B-47D7-BC38-5980E3F6F2FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "1CEB9CEA-9245-490F-88F6-EFD23B11A19B", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*", "matchCriteriaId": "0669D0E2-AB83-44AE-A87C-C7EB7AA2953A", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*", "matchCriteriaId": "062E2A9A-CF88-4844-B5A1-7418722087D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "0F8E031C-CE1F-410F-8F32-B3E33719C498", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "87F80FDC-7851-4EA8-BC7D-87B85C6BB93C", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*", "matchCriteriaId": "8C3AB68F-1D78-4217-9C56-B1B25F62FF38", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp5:*:*:*:*:*:*", "matchCriteriaId": "0F7A41C8-4332-4F8C-A297-6850C05B3EB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp6:*:*:*:*:*:*", "matchCriteriaId": "5DC7371E-6D35-4C9A-B688-E14391D9B953", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp7:*:*:*:*:*:*", "matchCriteriaId": "CF0FC43C-4041-49B4-87AD-63D7BE17136D", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:sp8:*:*:*:*:*:*", "matchCriteriaId": "D758AB52-B592-4E83-89F8-A05ED75F2367", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command." }, { "lang": "es", "value": "El desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en NWFTPD.nlm anterior a versi\u00f3n 5.10.01 en el servidor FTP en Novell NetWare versiones 5.1 hasta 6.5 SP8, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) o posiblemente ejecutar c\u00f3digo arbitrario por medio de un comando largo (1) MKD, (2) RMD, (3) RNFR o (4) DELE." } ], "id": "CVE-2010-0625", "lastModified": "2024-11-21T01:12:36.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T16:30:00.577", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39151" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023768" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "cve@mitre.org", "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=12\u0026Itemid=12" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/510353/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/510557/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/39041" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0742" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-062" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=569496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/39151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=12\u0026Itemid=12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/510353/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/510557/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=569496" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:43
Severity ?
Summary
Unspecified vulnerability in NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (abend) via a crafted username.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.01i | |
novell | netware_ftp_server | 5.01o | |
novell | netware_ftp_server | 5.01w | |
novell | netware_ftp_server | 5.01y | |
novell | netware_ftp_server | 5.02b | |
novell | netware_ftp_server | 5.02i | |
novell | netware_ftp_server | 5.02r | |
novell | netware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2DB9D60-93E9-4602-A3FA-1A87D841C86D", "versionEndIncluding": "5.02y", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "matchCriteriaId": "2093B36D-EBE4-4B12-A44B-F06929B828BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF45C68A-5F83-4090-A0C1-A09EC2987706", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in NWFTPD.nlm before 5.03b in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (abend) via a crafted username." }, { "lang": "es", "value": "Vulnerabilidad no especificada en NWFTPD.nlm anterior a v5.03b del servidor FTP de Novell NetWare, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ABEND, finalizaci\u00f3n no normal) a trav\u00e9s de un nombre de usuario manipulado." } ], "id": "CVE-2002-2432", "lastModified": "2024-11-20T23:43:40.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.563", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:47
Severity ?
Summary
NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly perform "intruder detection," which has unspecified impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.04.05 in the FTP server in Novell NetWare 6.5 does not properly perform \"intruder detection,\" which has unspecified impact and attack vectors." }, { "lang": "es", "value": "El fichero NWFTPD.nlm antes de la versi\u00f3n v5.04.05 en el servidor FTP de Novell NetWare v6.5 no realiza correctamente la detecci\u00f3n de intrusos, lo cual tiene un impacto y unos vectores de ataque no especificados." } ], "id": "CVE-2003-1595", "lastModified": "2024-11-20T23:47:31.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.750", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:47
Severity ?
Summary
Multiple buffer overflows in NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 allow remote attackers to cause a denial of service (abend) via a long (1) username or (2) password.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B04B18E8-A130-4BAA-8BBC-D9DF7085F9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "B9700BC2-BE56-448F-BAE6-AD01F71DC646", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "FE91855A-062B-47D7-BC38-5980E3F6F2FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 allow remote attackers to cause a denial of service (abend) via a long (1) username or (2) password." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el fichero NWFTPD.nlm del servidor FTP en Novell NetWare v6.0 antes del Service Pack 4 y v6.5 antes del Service Pack 1 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un (1)nombre de usuario o (2) contrase\u00f1a demasiado largos." } ], "id": "CVE-2003-1592", "lastModified": "2024-11-20T23:47:31.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.670", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:34
Severity ?
Summary
NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allows remote authenticated users to cause a denial of service (abend) by sending an RNTO command after a failed RNFR command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | 5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "5330E7C7-1436-4120-AC87-3A7C1A68ABC8", "versionEndIncluding": "5.01i", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "A06A23FD-5CEB-4737-9478-6C50E635E71B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allows remote authenticated users to cause a denial of service (abend) by sending an RNTO command after a failed RNFR command." }, { "lang": "es", "value": "El fichero NWFTPD.nlm antes de su versi\u00f3n v5.01o en el servidor FTP de Novell NetWare v5.1 SP3 permite a los usuarios remotos autenticados causar una denegaci\u00f3n de servicio mediante el env\u00edo de un comando RNTO despu\u00e9s de un comando RNFR fallido." } ], "id": "CVE-2000-1246", "lastModified": "2024-11-20T23:34:21.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:54
Severity ?
Summary
NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52FF91EA-4411-460E-9943-2427E884D3F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF45C68A-5F83-4090-A0C1-A09EC2987706", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.04.25 en el servidor FTP en Novell NetWare puntualmente no cierra las sesiones DS, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento del espacio de conexi\u00f3n) estableciendo varias sesiones FTP, que persisten mientras dure la sesi\u00f3n DS." } ], "id": "CVE-2004-2767", "lastModified": "2024-11-20T23:54:10.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.813", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2024-11-20 23:34
Severity ?
Summary
Multiple unspecified vulnerabilities in NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allow remote attackers to bypass intended restrictions on anonymous access via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware | 5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "5330E7C7-1436-4120-AC87-3A7C1A68ABC8", "versionEndIncluding": "5.01i", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "A06A23FD-5CEB-4737-9478-6C50E635E71B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in NWFTPD.nlm before 5.01o in the FTP server in Novell NetWare 5.1 SP3 allow remote attackers to bypass intended restrictions on anonymous access via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en NWFTPD.nlm antes de v5.01o en el servidor FTP de Novell NetWare 5.1 SP3 permiten a atacantes remotos eludir restricciones al acceso an\u00f3nimo a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2000-1245", "lastModified": "2024-11-20T23:34:21.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-20 22:02
Modified
2024-11-21 00:08
Severity ?
Summary
Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.07 | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EF76070-CF38-40E1-88EB-9713DE3FAD9C", "versionEndIncluding": "5.06.05", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.07:*:*:*:*:*:*:*", "matchCriteriaId": "EACC687E-DB67-4836-88F8-D2A371EEDB0D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*", "matchCriteriaId": "8C3AB68F-1D78-4217-9C56-B1B25F62FF38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow." } ], "id": "CVE-2006-1322", "lastModified": "2024-11-21T00:08:34.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-20T22:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19265" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015781" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23949" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17137" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0975" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973435.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25289" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }