CVE-2010-0625
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
05/04/2010
Last modified:
29/04/2026
Description
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:* | ||
| cpe:2.3:a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/39151
- http://securitytracker.com/id?1023768
- http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12
- http://www.securityfocus.com/archive/1/510353/100/0/threaded
- http://www.securityfocus.com/archive/1/510557/100/0/threaded
- http://www.securityfocus.com/bid/39041
- http://www.vupen.com/english/advisories/2010/0742
- http://www.zerodayinitiative.com/advisories/ZDI-10-062
- https://bugzilla.novell.com/show_bug.cgi?id=569496
- http://secunia.com/advisories/39151
- http://securitytracker.com/id?1023768
- http://www.novell.com/support/viewContent.do?externalId=3238588&sliceId=1
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=12&Itemid=12
- http://www.securityfocus.com/archive/1/510353/100/0/threaded
- http://www.securityfocus.com/archive/1/510557/100/0/threaded
- http://www.securityfocus.com/bid/39041
- http://www.vupen.com/english/advisories/2010/0742
- http://www.zerodayinitiative.com/advisories/ZDI-10-062
- https://bugzilla.novell.com/show_bug.cgi?id=569496



