Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2009-5153


In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.


Published

2018-11-21T15:29:00.230

Last Modified

2024-11-21T01:11:17.087

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application microfocus netware ≤ 6.5 Yes
Application microfocus netware 6.5 Yes
Application microfocus netware 6.5 Yes
Application microfocus netware 6.5 Yes
Application microfocus netware 6.5 Yes
Application microfocus netware 6.5 Yes
Application microfocus netware 6.5 Yes
Application microfocus netware 6.5 Yes

References