Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2010-0625

CVE information

Published

12 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command..

CVSSv2.0 Score

Severity
Medium
Base Score
6.5/10
Exploit Score
8/10
Access Vector
Network
Access Complexity
Low
Authentication Required
Single
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:novell:netware_ftp_server:5.06.04:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.07.02:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.07:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.05.04:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.06.05:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:5.1:sp6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:5.1:sp4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:5.1:sp2a:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:5.1:sp3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp7:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp8:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:novell:netware:6.5:sp5:*:*:*:*:*:*
  Yes
-