| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.0 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in Novell BorderManager 3.8. This issue affects some unknown processing of the file clntrust.exe. Executing a manipulation can lead to memory corruption. This vulnerability appears as CVE-2007-5767. There is no available exploit. You should upgrade the affected component.
Details
A vulnerability classified as critical was found in Novell BorderManager 3.8. This vulnerability affects some unknown functionality of the file clntrust.exe. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character.
The weakness was presented 11/02/2007 (Website). The advisory is available at secunia.com. This vulnerability was named CVE-2007-5767 since 10/31/2007. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit.
It is declared as proof-of-concept.
Upgrading to version 3.8 eliminates this vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 26285†), Secunia (SA27468†) and SecurityTracker (ID 1018882†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.novell.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.0
VulDB Base Score: 10.0
VulDB Temp Score: 9.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: BorderManager 3.8
Timeline
10/31/2007 🔍10/31/2007 🔍
10/31/2007 🔍
11/01/2007 🔍
11/02/2007 🔍
11/02/2007 🔍
03/16/2015 🔍
09/10/2018 🔍
Sources
Vendor: novell.comAdvisory: secunia.com⛔
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2007-5767 (🔍)
GCVE (CVE): GCVE-0-2007-5767
GCVE (VulDB): GCVE-100-39538
SecurityFocus: 26285 - Novell BorderManager Client Trust Heap Based Buffer Overflow Vulnerability
Secunia: 27468 - Novell BorderManager Client Trust Buffer Overflow Vulnerability, Highly Critical
SecurityTracker: 1018882
Vupen: ADV-2007-3682
Entry
Created: 03/16/2015 12:18Updated: 09/10/2018 08:25
Changes: 03/16/2015 12:18 (56), 09/10/2018 08:25 (7)
Complete: 🔍
Cache ID: 216:F2F:103

No comments yet. Languages: en.
Please log in to comment.