Vulnerability Details : CVE-2010-2351
Stack-based buffer overflow in the CIFS.NLM driver in Netware SMB 1.0 for Novell Netware 6.5 SP8 and earlier allows remote attackers to execute arbitrary code via a Sessions Setup AndX packet with a long AccountName.
Vulnerability category: OverflowExecute code
Threat overview for CVE-2010-2351
Top countries where our scanners detected CVE-2010-2351
Top open port discovered on systems with this issue
80
IPs affected by CVE-2010-2351 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-2351!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-2351
Probability of exploitation activity in the next 30 days: 45.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2351
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-2351
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2351
-
http://www.exploit-db.com/exploits/13906
Netware - SMB Remote Stack Overflow (PoC) - Novell dos ExploitExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/59501
Novell Netware CIFS.NLM buffer overflow CVE-2010-2351 Vulnerability Report
-
http://www.securityfocus.com/bid/40908
Novell Netware SMB Remote Buffer Overflow VulnerabilityExploit
-
http://download.novell.com/Download?buildid=tMWCI1cdI7s~
Downloads - NSS Update for NetWare 6.5 Support Pack 8 2.0Patch
-
http://www.stratsec.net/Research/Advisories/SS-2010-006-Netware-SMB-Remote-Stack-Overflow
Invalid license keyExploit
-
http://www.vupen.com/english/advisories/2010/1514
Webmail | OVH- OVHVendor Advisory
Products affected by CVE-2010-2351
- cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:*:sp8:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp6:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp5:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp7:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:5.1:sp7:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:5.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp1:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:5.1:sp8:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp4:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.5:sp3:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:novell:netware:6.0:sp5:*:*:*:*:*:*