CVE-2007-2171

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Stack-based buffer overflow in the base64_decode function in GWINTER.exe in Novell GroupWise (GW) WebAccess before 7.0 SP2 allows remote attackers to execute arbitrary code via long base64 content in an HTTP Basic Authentication request.

References

http://download.novell.com/Download?buildid=8RF83go0nZg~

http://download.novell.com/Download?buildid=O9ucpbS1bK0~

http://secunia.com/advisories/24944

http://securityreason.com/securityalert/2610

http://www.securityfocus.com/archive/1/466212/100/0/threaded

http://www.securityfocus.com/bid/23556

http://www.securitytracker.com/id?1017932

http://www.vupen.com/english/advisories/2007/1455

http://www.zerodayinitiative.com/advisories/ZDI-07-015.html

Details

Source: MITRE

Published: 2007-04-24

Updated: 2018-10-16

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (2 total)

IDNameProductFamilySeverity
25084Novell Groupwise WebAccess GWINTER.EXE Base64 Decoding Remote OverflowNessusGain a shell remotely
critical
3971GroupWise < 7.0.0 SP2 WebAccess GWINTER.exe Base64 Decoding OverflowNessus Network MonitorCGI
medium