| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.8 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as problematic has been found in Novell Client up to 4.91 SP3 on Windows. This affects an unknown part of the component Terminal Server/Citrix. The manipulation results in an unknown weakness. This vulnerability is identified as CVE-2007-0108. The attack can be executed remotely. There is not any exploit available. It is advisable to implement a patch to correct this issue.
Details
A vulnerability was found in Novell Client up to 4.91 SP3 on Windows. It has been classified as problematic. Affected is an unknown part of the component Terminal Server/Citrix. This is going to have an impact on integrity. CVE summarizes:
nwgina.dll in Novell Client 4.91 SP3 for Windows 2000/XP/2003 does not delete user profiles during a Terminal Service or Citrix session, which allows remote authenticated users to invoke alternate user profiles.
The weakness was released 01/05/2007 with Novell (Website). The advisory is shared for download at support.novell.com. This vulnerability is traded as CVE-2007-0108 since 01/08/2007. It is possible to launch the attack remotely. A authentication is necessary for exploitation. There are neither technical details nor an exploit publicly available.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 23978 (Novell Client TS/Citrix Session Arbitrary User Profile Invocation), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows and running in the context l.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.novell.com.
The vulnerability is also documented in the databases at X-Force (31343), Tenable (23978), SecurityFocus (BID 21886†), OSVDB (31358†) and Secunia (SA23619†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.novell.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 3.8
VulDB Base Score: 4.3
VulDB Temp Score: 3.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: UnknownCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 23978
Nessus Name: Novell Client TS/Citrix Session Arbitrary User Profile Invocation
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: support.novell.com
Timeline
01/05/2007 🔍01/05/2007 🔍
01/05/2007 🔍
01/05/2007 🔍
01/05/2007 🔍
01/05/2007 🔍
01/06/2007 🔍
01/08/2007 🔍
01/08/2007 🔍
01/08/2007 🔍
01/09/2007 🔍
03/15/2021 🔍
Sources
Vendor: novell.comAdvisory: support.novell.com
Researcher: http://www.novell.com
Organization: Novell
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2007-0108 (🔍)
GCVE (CVE): GCVE-0-2007-0108
GCVE (VulDB): GCVE-100-2796
X-Force: 31343 - Novell Client Terminal Server/Citrix session security bypass, Medium Risk
SecurityFocus: 21886 - Novell Client NWGINA.DLL User Profile Security Bypass Vulnerability
Secunia: 23619 - Novell Client User Profile Restriction Bypass, Less Critical
OSVDB: 31358 - Novell Client TS/Citrix Session Arbitrary User Profile Invocation
SecurityTracker: 1017471 - Novell Client NWGINA Bug May Prevent User Profiles from Being Deleted
Vulnerability Center: 13862 - Novell Client Profile Access Security Bypass in nwgina.dll, Medium
Vupen: ADV-2007-0064
Entry
Created: 01/09/2007 13:05Updated: 03/15/2021 07:20
Changes: 01/09/2007 13:05 (86), 06/07/2019 14:15 (6), 03/15/2021 07:20 (2)
Complete: 🔍
Cache ID: 216:C25:103
Once again VulDB remains the best source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.