Vulnerability Description
Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Netware | 5.1 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0041.html
- http://marc.info/?l=bugtraq&m=105897561229347&w=2
- http://marc.info/?l=bugtraq&m=105897724931665&w=2
- http://support.novell.com/servlet/tidfinder/2966549
- http://www.kb.cert.org/vuls/id/185593US Government Resource
- http://www.protego.dk/advisories/200301.html
- http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0041.html
- http://marc.info/?l=bugtraq&m=105897561229347&w=2
- http://marc.info/?l=bugtraq&m=105897724931665&w=2
- http://support.novell.com/servlet/tidfinder/2966549
- http://www.kb.cert.org/vuls/id/185593US Government Resource
- http://www.protego.dk/advisories/200301.html
FAQ
What is CVE-2003-0562?
CVE-2003-0562 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.
How severe is CVE-2003-0562?
CVE-2003-0562 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0562?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Netware.