CVE-2003-1596
Published Apr 5, 2010
Last updated 14 years ago
Overview
- Description
- NWFTPD.nlm before 5.03.12 in the FTP server in Novell NetWare does not properly restrict filesystem use by anonymous users with NFS Gateway home directories, which allows remote attackers to bypass intended access restrictions via an FTP session.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8545920B-3265-4261-A6B5-E327F67D37A9", "versionEndIncluding": "5.03b" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2093B36D-EBE4-4B12-A44B-F06929B828BE" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18" }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4304B8D-E271-41C6-9D84-E71AA3D683E1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "455ED4E4-8033-4043-BF10-20188BF0B8B6" }, { "criteria": "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE9F2EF1-D7CB-4D76-BAC0-EA28E5F9D82E" }, { "criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2" } ], "operator": "OR" } ], "operator": "AND" } ]