Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-1350 | First vendor Publication | 2009-04-21 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1350 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-42 | MIME Conversion |
CAPEC-44 | Overflow Binary Resource File |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-100 | Overflow Buffers |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
SAINT Exploits
Description | Link |
---|---|
Novell Client NetIdentity Agent XTIERRPCPIPE pointer dereference vulnerability | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2009-04-24 | Name : Novell NetIdentity Agent Pointer Dereference Remote Code Execution Vulnerability File : nvt/secpod_novell_net_idnty_code_exec_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
53351 | Novell Client NetIdentity Agent xtagent.exe RPC Message Handling Arbitrary Co... A buffer overflow exists in Netware. The NetIdentity Agent fails to validate RPC messages received via XTIERRPCPIPE resulting in a stack overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-03-06 | Novell Client NetIdentity Agent remote arbitrary pointer dereference code exe... RuleID : 29536 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | Novell Client NetIdentity Agent remote arbitrary pointer dereference code exe... RuleID : 18589 - Revision : 12 - Type : SERVER-OTHER |
2014-01-10 | Novell Client NetIdentity Agent remote arbitrary pointer dereference code exe... RuleID : 17057 - Revision : 10 - Type : SERVER-OTHER |
2014-01-10 | Novell NetIdentity Agent XTIERRPCPIPE remote code execution attempt RuleID : 17056 - Revision : 10 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-07 | Name : The remote Windows host allows remote execution of arbitrary code. File : novell_netidentity_1_2_4.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:11:34 |
|
2024-11-28 12:18:46 |
|
2021-05-04 12:09:27 |
|
2021-04-22 01:09:47 |
|
2020-05-23 13:16:52 |
|
2020-05-23 00:23:39 |
|
2018-10-11 00:19:35 |
|
2014-03-06 21:20:44 |
|
2014-02-17 10:49:44 |
|
2014-01-19 21:25:50 |
|
2013-05-10 23:49:09 |
|