ID

VAR-200804-0065


CVE

CVE-2008-1701


TITLE

Novell NetWare Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-004313

DESCRIPTION

Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request. Novell NetWare is prone to a denial-of-service vulnerability due to an unspecified error. Remote attackers can exploit this issue to deny service to legitimate users. The issue affects Novell NetWare 6.5; other versions may also be vulnerable. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. The vulnerability is caused due to an error when processing requests e.g. The vulnerability is reported in version 6.5. SOLUTION: Apply updates. http://download.novell.com/Download?buildid=u0MH4z5NQts~ PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Novell (3842033): https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-1701 // JVNDB: JVNDB-2008-004313 // BID: 28561 // VULHUB: VHN-31826 // PACKETSTORM: 65094

AFFECTED PRODUCTS

vendor:novellmodel:iprintscope:eqversion:6.5

Trust: 1.0

vendor:novellmodel:iprint clientscope:eqversion:6.5

Trust: 0.8

vendor:novellmodel:netware sp1.1scope:eqversion:6.5

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.5.2

Trust: 0.6

vendor:novellmodel:netware sp7scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp6scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp5scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp4scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp3scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp2scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netware sp1scope:eqversion:6.5

Trust: 0.3

vendor:novellmodel:netwarescope:eqversion:6.5

Trust: 0.3

sources: BID: 28561 // JVNDB: JVNDB-2008-004313 // CNNVD: CNNVD-200804-100 // NVD: CVE-2008-1701

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1701
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-1701
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200804-100
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31826
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1701
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31826
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31826 // JVNDB: JVNDB-2008-004313 // CNNVD: CNNVD-200804-100 // NVD: CVE-2008-1701

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2008-004313 // NVD: CVE-2008-1701

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200804-100

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200804-100

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004313

PATCH

title:Top Pageurl:http://www.novell.com/home/

Trust: 0.8

sources: JVNDB: JVNDB-2008-004313

EXTERNAL IDS

db:NVDid:CVE-2008-1701

Trust: 2.8

db:BIDid:28561

Trust: 2.0

db:SECUNIAid:29587

Trust: 1.8

db:VUPENid:ADV-2008-1074

Trust: 1.7

db:SECTRACKid:1019750

Trust: 1.7

db:JVNDBid:JVNDB-2008-004313

Trust: 0.8

db:CNNVDid:CNNVD-200804-100

Trust: 0.7

db:XFid:41588

Trust: 0.6

db:VULHUBid:VHN-31826

Trust: 0.1

db:PACKETSTORMid:65094

Trust: 0.1

sources: VULHUB: VHN-31826 // BID: 28561 // JVNDB: JVNDB-2008-004313 // PACKETSTORM: 65094 // CNNVD: CNNVD-200804-100 // NVD: CVE-2008-1701

REFERENCES

url:https://secure-support.novell.com/kanisaplatform/publishing/667/3842033_f.sal_public.html

Trust: 2.1

url:http://www.securityfocus.com/bid/28561

Trust: 1.7

url:http://www.securitytracker.com/id?1019750

Trust: 1.7

url:http://secunia.com/advisories/29587

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1074/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41588

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1701

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1701

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41588

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1074/references

Trust: 0.6

url:http://www.novell.com

Trust: 0.3

url:http://secunia.com/advisories/29587/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://download.novell.com/download?buildid=u0mh4z5nqts~

Trust: 0.1

url:http://secunia.com/product/78/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-31826 // BID: 28561 // JVNDB: JVNDB-2008-004313 // PACKETSTORM: 65094 // CNNVD: CNNVD-200804-100 // NVD: CVE-2008-1701

CREDITS

The vendor

Trust: 0.9

sources: BID: 28561 // CNNVD: CNNVD-200804-100

SOURCES

db:VULHUBid:VHN-31826
db:BIDid:28561
db:JVNDBid:JVNDB-2008-004313
db:PACKETSTORMid:65094
db:CNNVDid:CNNVD-200804-100
db:NVDid:CVE-2008-1701

LAST UPDATE DATE

2024-11-23T22:32:04.128000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31826date:2017-08-08T00:00:00
db:BIDid:28561date:2015-05-07T17:30:00
db:JVNDBid:JVNDB-2008-004313date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200804-100date:2008-09-05T00:00:00
db:NVDid:CVE-2008-1701date:2024-11-21T00:45:07.990

SOURCES RELEASE DATE

db:VULHUBid:VHN-31826date:2008-04-08T00:00:00
db:BIDid:28561date:2008-04-01T00:00:00
db:JVNDBid:JVNDB-2008-004313date:2012-09-25T00:00:00
db:PACKETSTORMid:65094date:2008-04-03T04:45:58
db:CNNVDid:CNNVD-200804-100date:2008-04-08T00:00:00
db:NVDid:CVE-2008-1701date:2008-04-08T18:05:00