Novell NetWare 6.5 OpenSSH Remote Stack Buffer Overflow

high Nessus Plugin ID 44066

Synopsis

The SSH server running on the remote host has a buffer overflow vulnerability.

Description

The version of OpenSSH running on the remote Novell NetWare host has a stack-based buffer overflow vulnerability. When attempting to resolve an absolute path on the server, data is copied into a 512 byte buffer without any bounds checking. A remote, authenticated attacker could exploit this to execute arbitrary code.

Solution

There is no fix available, and the software is no longer supported.

See Also

https://support.microfocus.com/kb/doc.php?id=7006756

http://www.nessus.org/u?240e3831

https://www.securityfocus.com/archive/1/513483/30/0/threaded

https://www.zerodayinitiative.com/advisories/ZDI-10-169/

Plugin Details

Severity: High

ID: 44066

File Name: netware_sshd_buffer_overflow.nasl

Version: 1.8

Type: remote

Family: Netware

Published: 10/4/2011

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:novell:netware:6.5

Required KB Items: Host/OS

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/30/2010

Reference Information

BID: 42875