ID

VAR-200010-0084


CVE

CVE-2000-0704


TITLE

WorldView Wnn Jserver Remote buffer overflow vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200010-054

DESCRIPTION

Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands. A remote buffer overflow exists in the Asian language servers portion of a number of different implementations of Wnn. It has been reported that only systems that have WorldView Japanese, Korean, and Chinese installed are vulnerable to this issue. Wnn is a Kana-Kanji translation system, most commonly used for foreign language support in Unix systems. An overflow exists when the server receives a long string with a Wnn command, such as JS_OPEN, JS_MKDIR or JS_FILE_INFO included. By creating a buffer containing machine executable code, it is possible to cause a remote system running the jserver daemon to execute arbitrary commands as the user the daemon is running as. This is frequently root. It is a server-client application, and the Jserver part acts as the server side, providing translation services for clients. Some versions of Wnn have a remote buffer overflow vulnerability. Carefully constructed strings leading to overflows have the potential to execute arbitrary commands with privileges owned by the Jserver, usually root

Trust: 1.26

sources: NVD: CVE-2000-0704 // BID: 1603 // VULHUB: VHN-2281

AFFECTED PRODUCTS

vendor:freewnnmodel:freewnnscope:eqversion:1.0

Trust: 1.9

vendor:omronmodel:worldviewscope:eqversion:6.5

Trust: 1.3

vendor:freewnnmodel:freewnnscope:eqversion:1.1

Trust: 1.3

vendor:wnnmodel:wnn4scope:eqversion:4.2.8

Trust: 1.0

vendor:freewnnmodel:freewnnscope:eqversion:1.1.1_axxx

Trust: 1.0

vendor:wnnmodel:wnn4scope:eqversion:4.2.2tl

Trust: 1.0

vendor:wnnmodel:wnn4scope:eqversion:4.2.5tl

Trust: 1.0

vendor:wnnmodel:wnn4scope:eqversion:4.2-8

Trust: 0.3

vendor:wnnmodel:wnn4 -5tlscope:eqversion:4.2

Trust: 0.3

vendor:wnnmodel:wnn4 -2tlscope:eqversion:4.2

Trust: 0.3

vendor:freewnnmodel:-axxxscope:eqversion:1.1.1

Trust: 0.3

sources: BID: 1603 // CNNVD: CNNVD-200010-054 // NVD: CVE-2000-0704

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2000-0704
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200010-054
value: CRITICAL

Trust: 0.6

VULHUB: VHN-2281
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2000-0704
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-2281
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-2281 // CNNVD: CNNVD-200010-054 // NVD: CVE-2000-0704

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2000-0704

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200010-054

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 1603 // CNNVD: CNNVD-200010-054

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-2281

EXTERNAL IDS

db:BIDid:1603

Trust: 2.0

db:NVDid:CVE-2000-0704

Trust: 2.0

db:OSVDBid:11080

Trust: 1.7

db:CNNVDid:CNNVD-200010-054

Trust: 0.7

db:SGIid:20000803-01-A

Trust: 0.6

db:NSFOCUSid:3632

Trust: 0.6

db:XFid:5163

Trust: 0.6

db:EXPLOIT-DBid:20163

Trust: 0.1

db:SEEBUGid:SSVID-74052

Trust: 0.1

db:VULHUBid:VHN-2281

Trust: 0.1

sources: VULHUB: VHN-2281 // BID: 1603 // CNNVD: CNNVD-200010-054 // NVD: CVE-2000-0704

REFERENCES

url:http://www.securityfocus.com/bid/1603

Trust: 1.7

url:http://www.osvdb.org/11080

Trust: 1.7

url:ftp://sgigate.sgi.com/security/20000803-01-a

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/5163

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/5163

Trust: 0.6

url:http://www.nsfocus.net/vulndb/3632

Trust: 0.6

url:http://www.freewnn.org

Trust: 0.3

url:http://www.tomo.gr.jp/users/wnn/0008ml/msg00000.html

Trust: 0.3

url:http://support.sgi.com

Trust: 0.3

url:http://www.turbolinux.com/support/

Trust: 0.3

url:http://shadowpenguin.backsection.net/advisories/advisory034.html

Trust: 0.3

sources: VULHUB: VHN-2281 // BID: 1603 // CNNVD: CNNVD-200010-054 // NVD: CVE-2000-0704

CREDITS

UNYUN unyun@shadowpenguin.org

Trust: 0.6

sources: CNNVD: CNNVD-200010-054

SOURCES

db:VULHUBid:VHN-2281
db:BIDid:1603
db:CNNVDid:CNNVD-200010-054
db:NVDid:CVE-2000-0704

LAST UPDATE DATE

2024-08-14T14:42:30.180000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-2281date:2017-07-11T00:00:00
db:BIDid:1603date:2009-07-11T02:56:00
db:CNNVDid:CNNVD-200010-054date:2005-10-20T00:00:00
db:NVDid:CVE-2000-0704date:2017-07-11T01:29:02.320

SOURCES RELEASE DATE

db:VULHUBid:VHN-2281date:2000-10-20T00:00:00
db:BIDid:1603date:2000-03-08T00:00:00
db:CNNVDid:CNNVD-200010-054date:2000-03-08T00:00:00
db:NVDid:CVE-2000-0704date:2000-10-20T04:00:00