Логотип exploitDog
bind:CVE-2009-5153
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-5153

Количество 2

Количество 2

nvd логотип

CVE-2009-5153

около 7 лет назад

In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-8rj8-7q6h-g4g9

почти 4 года назад

In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2009-5153

In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.

CVSS3: 9.8
10%
Средний
около 7 лет назад
github логотип
GHSA-8rj8-7q6h-g4g9

In Novell NetWare before 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated attackers to execute code, because a length field was incorrectly trusted.

CVSS3: 9.8
10%
Средний
почти 4 года назад

Уязвимостей на страницу