Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Novell 4.03 allows user-assisted attackers to execute arbitrary code via a crafted .NKNT file.
References
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-volumes-v-4-03-Code-Execution-and-DoS - Exploit, URL Repurposed | |
References | () http://www.insight-tech.org/xploits/KernelrecoveryforNovell%28Traditionalvolumes%29v.4.03CodeExecutionandDoS.py - URL Repurposed |
Information
Published : 2009-05-15 15:30
Updated : 2024-02-14 01:17
NVD link : CVE-2009-1639
Mitre link : CVE-2009-1639
CVE.ORG link : CVE-2009-1639
JSON object : View
Products Affected
nucleustechnologies
- kernel_recovery
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer