Executive Summary

Informations
NameCVE-2009-1350First vendor Publication2009-04-21
VendorCveLast vendor Modification2018-10-10

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1350

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-8Buffer Overflow in an API Call
CAPEC-9Buffer Overflow in Local Command-Line Utilities
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-14Client-side Injection-induced Buffer Overflow
CAPEC-24Filter Failure through Buffer Overflow
CAPEC-42MIME Conversion
CAPEC-44Overflow Binary Resource File
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-46Overflow Variables and Tags
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-100Overflow Buffers

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

SAINT Exploits

DescriptionLink
Novell Client NetIdentity Agent XTIERRPCPIPE pointer dereference vulnerabilityMore info here

OpenVAS Exploits

DateDescription
2009-04-24Name : Novell NetIdentity Agent Pointer Dereference Remote Code Execution Vulnerability
File : nvt/secpod_novell_net_idnty_code_exec_vuln.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
53351Novell Client NetIdentity Agent xtagent.exe RPC Message Handling Arbitrary Co...

Snort® IPS/IDS

DateDescription
2014-03-06Novell Client NetIdentity Agent remote arbitrary pointer dereference code exe...
RuleID : 29536 - Revision : 3 - Type : SERVER-OTHER
2014-01-10Novell Client NetIdentity Agent remote arbitrary pointer dereference code exe...
RuleID : 18589 - Revision : 12 - Type : SERVER-OTHER
2014-01-10Novell Client NetIdentity Agent remote arbitrary pointer dereference code exe...
RuleID : 17057 - Revision : 10 - Type : SERVER-OTHER
2014-01-10Novell NetIdentity Agent XTIERRPCPIPE remote code execution attempt
RuleID : 17056 - Revision : 10 - Type : SERVER-OTHER

Metasploit Database

idDescription
2009-04-06 Novell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow

Nessus® Vulnerability Scanner

DateDescription
2009-04-07Name : The remote Windows host allows remote execution of arbitrary code.
File : novell_netidentity_1_2_4.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/34400
BUGTRAQ http://www.securityfocus.com/archive/1/502514/100/0/threaded
CONFIRM http://download.novell.com/Download?buildid=6ERQGPjRZ8o~
MISC http://www.zerodayinitiative.com/advisories/ZDI-09-016/
https://bugzilla.novell.com/show_bug.cgi?id=437511
SECTRACK http://www.securitytracker.com/id?1021990
VUPEN http://www.vupen.com/english/advisories/2009/0954

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
DateInformations
2018-10-11 00:19:35
  • Multiple Updates
2014-03-06 21:20:44
  • Multiple Updates
2014-02-17 10:49:44
  • Multiple Updates
2014-01-19 21:25:50
  • Multiple Updates
2013-05-10 23:49:09
  • Multiple Updates