Vulnerability Description
Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Novell 4.03 allows user-assisted attackers to execute arbitrary code via a crafted .NKNT file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nucleustechnologies | Kernel Recovery | 4.03 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/34798Vendor Advisory
- http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-vExploitURL Repurposed
- http://www.insight-tech.org/xploits/KernelrecoveryforNovell%28TraditionalvolumesURL Repurposed
- http://www.securityfocus.com/bid/34846
- http://secunia.com/advisories/34798Vendor Advisory
- http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-vExploitURL Repurposed
- http://www.insight-tech.org/xploits/KernelrecoveryforNovell%28TraditionalvolumesURL Repurposed
- http://www.securityfocus.com/bid/34846
FAQ
What is CVE-2009-1639?
CVE-2009-1639 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in Nucleus Data Recovery Kernel Recovery for Novell 4.03 allows user-assisted attackers to execute arbitrary code via a crafted .NKNT file.
How severe is CVE-2009-1639?
CVE-2009-1639 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1639?
Check the references section above for vendor advisories and patch information. Affected products include: Nucleustechnologies Kernel Recovery.