CVE-2009-1639

Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Novell 4.03 allows user-assisted attackers to execute arbitrary code via a crafted .NKNT file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nucleustechnologies:kernel_recovery:4.03:novell:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-volumes-v-4-03-Code-Execution-and-DoS - Exploit () http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-volumes-v-4-03-Code-Execution-and-DoS - Exploit, URL Repurposed
References () http://www.insight-tech.org/xploits/KernelrecoveryforNovell%28Traditionalvolumes%29v.4.03CodeExecutionandDoS.py - () http://www.insight-tech.org/xploits/KernelrecoveryforNovell%28Traditionalvolumes%29v.4.03CodeExecutionandDoS.py - URL Repurposed

Information

Published : 2009-05-15 15:30

Updated : 2024-02-14 01:17


NVD link : CVE-2009-1639

Mitre link : CVE-2009-1639

CVE.ORG link : CVE-2009-1639


JSON object : View

Products Affected

nucleustechnologies

  • kernel_recovery
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer