Novell Client 2.0 on Windows Vba32 AntiRootKit input validation

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic was found in Novell Client 2.0 on Windows. This vulnerability affects unknown code of the component Vba32 AntiRootKit. Such manipulation leads to input validation. This vulnerability is traded as CVE-2013-3705. Furthermore, there is an exploit available. Upgrading the affected component is advised.
Details
A vulnerability was found in Novell Client 2.0 on Windows. It has been rated as problematic. Affected by this issue is an unknown function of the component Vba32 AntiRootKit. The manipulation with an unknown input leads to a input validation vulnerability. Using CWE to declare the problem leads to CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. Impacted is availability. CVE summarizes:
The VBA32 AntiRootKit component for Novell Client 2 SP3 before IR5 on Windows allows local users to cause a denial of service (bugcheck and BSOD) via an IOCTL call for an invalid IOCTL.
The weakness was shared 12/20/2013 by Dmitry Varshavsky as 7014276 as confirmed advisory (Website). The advisory is shared for download at novell.com. This vulnerability is handled as CVE-2013-3705 since 05/30/2013. The attack needs to be approached locally. The successful exploitation requires a simple authentication. Technical details are unknown but a private exploit is available. The advisory points out:
This security vulnerability allows user-mode program to bugcheck the machine. This denial of service includes the potential for data loss, as a side-effect of bugchecking the machine while applications are running.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 72348 (Novell Client 2 Vba32 AntiRootKit DoS), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows. The commercial vulnerability scanner Qualys is able to test this issue with plugin 122688 (Novell Client 'VBA32 AntiRootKit' Component IOCTL Handling Local Denial of Service Vulnerability).
Upgrading to version 2 SP3 eliminates this vulnerability. The upgrade is hosted for download at download.novell.com. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (90062), Tenable (72348), SecurityFocus (BID 64484†), OSVDB (101261†) and Vulnerability Center (SBV-42874†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.novell.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.5
VulDB Temp Score: 5.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Access: Private
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 72348
Nessus Name: Novell Client 2 Vba32 AntiRootKit DoS
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Client 2 SP3
Timeline
05/30/2013 🔍12/10/2013 🔍
12/10/2013 🔍
12/20/2013 🔍
12/20/2013 🔍
12/22/2013 🔍
12/22/2013 🔍
01/14/2014 🔍
02/05/2014 🔍
12/25/2024 🔍
Sources
Vendor: novell.comAdvisory: 7014276
Researcher: Dmitry Varshavsky
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2013-3705 (🔍)
GCVE (CVE): GCVE-0-2013-3705
GCVE (VulDB): GCVE-100-11564
X-Force: 90062
SecurityFocus: 64484 - Novell Client 'VBA32 AntiRootKit' Component IOCTL Handling Local Denial of Service Vulnerability
OSVDB: 101261
Vulnerability Center: 42874 - Novell Client Before 2 SP3 IR5 on Windows Local DoS Vulnerability via an IOCTL Call for an Invalid IOCTL, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 12/22/2013 13:34Updated: 12/25/2024 22:58
Changes: 12/22/2013 13:34 (74), 05/19/2017 10:53 (3), 06/04/2021 14:25 (3), 12/25/2024 22:58 (16)
Complete: 🔍
Cache ID: 216:1E3:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.