CVE-2010-1929

Multiple stack-based buffer overflows in the jclient._Java_novell_jclient_JClient_defineClass@20 function in jclient.dll in the Tomcat web server in Novell iManager 2.7, 2.7.3, and 2.7.3 FTF2 allow remote authenticated users to execute arbitrary code via the (1) EnteredClassID or (2) NewClassName parameter to nps/servlet/webacc.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:imanager:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:imanager:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:novell:imanager:2.7.3:ftf2:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://secunia.com/advisories/40281 - Vendor Advisory () http://secunia.com/advisories/40281 - Vendor Advisory
References () http://securitytracker.com/id?1024152 - Exploit () http://securitytracker.com/id?1024152 - Exploit
References () http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities - Exploit () http://www.coresecurity.com/content/novell-imanager-buffer-overflow-off-by-one-vulnerabilities - Exploit
References () http://www.exploit-db.com/exploits/14010 - Exploit () http://www.exploit-db.com/exploits/14010 - Exploit
References () http://www.osvdb.org/65737 - () http://www.osvdb.org/65737 -
References () http://www.securityfocus.com/archive/1/511983/100/0/threaded - () http://www.securityfocus.com/archive/1/511983/100/0/threaded -
References () http://www.securityfocus.com/bid/40480 - Exploit () http://www.securityfocus.com/bid/40480 - Exploit
References () http://www.vupen.com/english/advisories/2010/1575 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1575 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/59694 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/59694 -

Information

Published : 2010-06-28 17:30

Updated : 2024-11-21 01:15


NVD link : CVE-2010-1929

Mitre link : CVE-2010-1929

CVE.ORG link : CVE-2010-1929


JSON object : View

Products Affected

novell

  • imanager
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer