CVE-2002-1418
CVSS5.0
发布时间 :2003-04-11 00:00:00
修订时间 :2008-09-05 16:30:33
NMCOS    

[原文]Buffer overflow in the interpreter for Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to cause a denial of service (ABEND) via a long module name.


[CNNVD]Novell NetBasic Scripting Server模块名缓冲区溢出漏洞(CNNVD-200304-106)

        
        NetBasic Scripting Server是一款NOVELL公司开发的由Web页访问数据库的技术,类似Perl代码执行。Perl -v显示版本信息,类似Microsoft公司的ASP与ADO等。
        NetBasic Scripting Server存在一个缓冲区溢出漏洞,远程攻击者可以输入超长模块名造成缓冲区溢出,可能执行任意代码或造成拒绝服务攻击。
        Netbasic在处理超长模块名时存在缓冲区溢出,攻击者可以提交包含超过230字节的模块名请求,可导致Netbasic Scripting Server崩溃。精心构建提交数据可能使攻击者以Netbasic Scripting server进程的权限执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:novell:netware:6.0Novell NetWare 6.0
cpe:/a:novell:small_business_suite:6.0Novell Small Business Suite 6.0
cpe:/o:novell:netware:5.1Novell NetWare 5.1
cpe:/a:novell:small_business_suite:5.1Novell Small Business Suite 5.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1418
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1418
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-106
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5524
(VENDOR_ADVISORY)  BID  5524
http://www.iss.net/security_center/static/9911.php
(VENDOR_ADVISORY)  XF  novell-netbasic-interpreter-bo(9911)
http://archives.neohapsis.com/archives/bugtraq/2002-08/0199.html
(VENDOR_ADVISORY)  BUGTRAQ  20020820 NOVL-2002-2963297 - NetBasic Buffer Overflow + Scripting Vulnerability
http://support.novell.com/servlet/tidfinder/2963297
(UNKNOWN)  CONFIRM  http://support.novell.com/servlet/tidfinder/2963297

- 漏洞信息

Novell NetBasic Scripting Server模块名缓冲区溢出漏洞
中危 边界条件错误
2003-04-11 00:00:00 2005-05-13 00:00:00
远程  
        
        NetBasic Scripting Server是一款NOVELL公司开发的由Web页访问数据库的技术,类似Perl代码执行。Perl -v显示版本信息,类似Microsoft公司的ASP与ADO等。
        NetBasic Scripting Server存在一个缓冲区溢出漏洞,远程攻击者可以输入超长模块名造成缓冲区溢出,可能执行任意代码或造成拒绝服务攻击。
        Netbasic在处理超长模块名时存在缓冲区溢出,攻击者可以提交包含超过230字节的模块名请求,可导致Netbasic Scripting Server崩溃。精心构建提交数据可能使攻击者以Netbasic Scripting server进程的权限执行任意指令。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时没有合适的临时解决方法。
        厂商补丁:
        Novell
        ------
        Novell已经为此发布了一个安全公告(NOVL-2002-2963297)以及相应补丁:
        NOVL-2002-2963297:NetBasic Buffer Overflow + Scripting Vulnerability
        链接:
        http://support.novell.com/servlet/tidfinder/2963297

        Novell公司已经提供补丁程序,但这个补丁是BETA版本,所以只有注册用户(不需要费用)才能下载:
        
        http://support.novell.com/servlet/filedownload/ftf/nscript1.exe/

        这个补丁展开来之后建立NSCRIPT.ZIP文件,解压这个ZIP文件到SYS:卷,然后重新启动服务器。

- 漏洞信息

10929
Novell NetBasic Scripting Server Long Module Name Overflow DoS
Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-08-20 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Novell NetBasic Interpreter Module Name Buffer Overflow Vulnerability
Boundary Condition Error 5524
Yes No
2002-08-20 12:00:00 2009-07-11 03:56:00
Discovery of this issue is credited to Rain Forrest Puppy <rfp@wiretrip.net>.

- 受影响的程序版本

Novell Small Business Suite 6.0
Novell Small Business Suite 5.1
Novell Netware 6.0
Novell Netware 5.1

- 漏洞讨论

The Novell NetBasic interpreter included in Novell NetBasic Scripting Server (NSN) is prone to a remotely exploitable buffer overflow condition. This is due to insufficient bounds checking of requests for modules. It is possible to reproduce this condition by supplying an overly long module name (230+ bytes) in a request to NSN.

This may be exploited to deny service, and possibly execute arbitrary code with the privileges of NSN.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

A fix has been made available:


Novell Small Business Suite 5.1

Novell Netware 5.1

Novell Netware 6.0

Novell Small Business Suite 6.0

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站