Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-4714 | First vendor Publication | 2011-01-31 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple stack-based buffer overflows in Novell GroupWise before 8.02HP allow remote attackers to execute arbitrary code via a long HTTP Host header to (1) gwpoa.exe in the Post Office Agent, (2) gwmta.exe in the Message Transfer Agent, (3) gwia.exe in the Internet Agent, (4) the WebAccess Agent, or (5) the Monitor Agent. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4714 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69143 | Novell GroupWise Multiple Agent HTTP 301 Response Host Header Overflow Novell GroupWise is prone to an overflow condition. The HTTP Interface contains a boundary error in the parsing of the HTTP "Host" header when creating a HTTP 301 response, resulting in a stack-based buffer overflow. With a specially crafted string, a remote attacker can potentially execute arbitrary code |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Novell GroupWise agents HTTP request remote code execution attempt RuleID : 18960 - Revision : 9 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-11-23 | Name : The remote Windows host has an application that is affected by multiple vulne... File : groupwise_ia_802_hp1.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:06:16 |
|
2024-11-28 12:24:01 |
|
2021-05-04 12:12:57 |
|
2021-04-22 01:13:43 |
|
2020-05-23 01:43:26 |
|
2020-05-23 00:27:17 |
|
2016-04-26 20:19:29 |
|
2014-02-17 10:59:08 |
|
2014-01-19 21:27:18 |
|
2013-05-10 23:39:16 |
|