CVE-2005-1060
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:48:06
NMCOS    

[原文]Unknown vulnerability in the TCP/IP functionality (TCPIP.NLM) in Novell Netware 6.x allows remote attackers to cause a denial of service (ABEND by Page Fault Processor Exception) via certain packets.


[CNNVD]Novell NetWare TCP堆栈远程拒绝服务漏洞(CNNVD-200505-243)

        Novell Netware 6.x的TCP/IP功能(TCPIP.NLM)中存在未知漏洞,允许远程攻击者通过特定的数据包来引起拒绝服务(由页面异常处理器异常终止)攻击。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:novell:netware:6.5:sp2Novell NetWare 6.5 Service Pack 2
cpe:/o:novell:netware:6.0:sp1
cpe:/o:novell:netware:6.0:sp3
cpe:/o:novell:netware:6.5:sp1Novell NetWare 6.5 Service Pack 1
cpe:/o:novell:netware:6.0Novell NetWare 6.0
cpe:/o:novell:netware:6.5:sp3Novell NetWare 6.5 Service Pack 3
cpe:/o:novell:netware:6.5:sp1.1b
cpe:/o:novell:netware:6.5Novell NetWare 6.5
cpe:/o:novell:netware:6.5:sp1.1a
cpe:/o:novell:netware:6.0:sp2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1060
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1060
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-243
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/13067
(PATCH)  BID  13067
http://xforce.iss.net/xforce/xfdb/20024
(UNKNOWN)  XF  novell-netware-tcpipnlm-dos(20024)
http://secunia.com/advisories/14874
(UNKNOWN)  SECUNIA  14874

- 漏洞信息

Novell NetWare TCP堆栈远程拒绝服务漏洞
中危 其他
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        Novell Netware 6.x的TCP/IP功能(TCPIP.NLM)中存在未知漏洞,允许远程攻击者通过特定的数据包来引起拒绝服务(由页面异常处理器异常终止)攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://support.novell.com/servlet/filedownload/sec/pub/tcp610jb.exe

- 漏洞信息

15349
Novell NetWare Malformed TCP Packet Processing DoS
Remote / Network Access Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

Novell Netware contains a flaw that may allow a remote denial of service. The issue is triggered due to an unspecified NULL pointer dereference error in TCPIP.NLM while processing a receiver TCP packet. This will result in loss of availability for the platform.

- 时间线

2005-04-07 Unknow
Unknow Unknow

- 解决方案

Apply vendor patch, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Novell NetWare TCP Stack Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 13067
Yes No
2005-04-08 12:00:00 2009-07-12 12:56:00
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

- 受影响的程序版本

Novell Netware 6.5 SP1.1(b)
Novell Netware 6.5 SP1.1(a)
Novell Netware 6.5 SP3
Novell Netware 6.5 SP2
Novell Netware 6.5 SP1
Novell Netware 6.5
Novell Netware 6.0 SP3
Novell Netware 6.0 SP2
Novell Netware 6.0 SP1
Novell Netware 6.0

- 漏洞讨论

A remote denial of service vulnerability affects Novell NetWare. This issue is due to a failure of the TCP stack to handle exceptional network traffic.

An attacker may leverage this issue to cause the TCP/IP stack implementation of an affected computer to crash, denying access to the network for legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has released Technical Information Documents TID2970467 and TID2970468 dealing with this issue. Please see the referenced information documents for more information.


Novell Netware 6.0 SP3

Novell Netware 6.0 SP2

Novell Netware 6.0 SP1

Novell Netware 6.5 SP3

Novell Netware 6.5 SP1

Novell Netware 6.5 SP1.1(a)

Novell Netware 6.5 SP1.1(b)

Novell Netware 6.5 SP2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站