fkie_cve-2005-4887
Vulnerability from fkie_nvd
Published
2010-04-05 15:30
Modified
2025-04-11 00:51
Severity ?
Summary
NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
novell | netware_ftp_server | * | |
novell | netware_ftp_server | 5.01o | |
novell | netware_ftp_server | 5.01w | |
novell | netware_ftp_server | 5.01y | |
novell | netware_ftp_server | 5.02b | |
novell | netware_ftp_server | 5.02i | |
novell | netware_ftp_server | 5.02r | |
novell | netware_ftp_server | 5.02y | |
novell | netware_ftp_server | 5.03b | |
novell | netware_ftp_server | 5.03l | |
novell | netware_ftp_server | 5.04.5 | |
novell | netware_ftp_server | 5.04.8 | |
novell | netware_ftp_server | 5.04.20 | |
novell | netware_ftp_server | 5.04.25 | |
novell | netware_ftp_server | 5.05 | |
novell | netware_ftp_server | 5.05.04 | |
novell | netware | 6.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "A156D9A9-8404-4236-90DB-2CE703C2D3DC", "versionEndIncluding": "5.06.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "matchCriteriaId": "9D22986D-C520-4533-B257-7597AD7323C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "matchCriteriaId": "6245EE38-90AA-4A4E-AE6A-A468FA902075", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "matchCriteriaId": "23197629-F3ED-463A-9718-4A96B0059CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "matchCriteriaId": "2E09E25F-F984-423B-B03A-2964DF173125", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "matchCriteriaId": "D5BCF530-0758-453E-ACFC-5129747A6660", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "matchCriteriaId": "51D76099-7058-4BC7-9229-F943D03ECD18", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*", "matchCriteriaId": "E4304B8D-E271-41C6-9D84-E71AA3D683E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:*", "matchCriteriaId": "0CA8CA21-1E2A-44CA-A21B-A74EA6BA81FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:*", "matchCriteriaId": "8519850A-56CB-4C6A-9E87-09F71281E20C", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:*", "matchCriteriaId": "069FC929-2FEF-44BA-AAEC-A795AF724B61", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:*", "matchCriteriaId": "24F12F0B-0439-4301-8767-A6F36097649A", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:*", "matchCriteriaId": "B8131B93-3147-4988-9193-19629C933D12", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:*", "matchCriteriaId": "58B67AD9-BE51-4B7C-AE9E-1D15AB70BA0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:*", "matchCriteriaId": "1F6C2582-0C8E-4743-82B1-51AF53AE3879", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:netware_ftp_server:5.05.04:*:*:*:*:*:*:*", "matchCriteriaId": "B387DDA6-FF1B-48D6-85AF-EB1221CF47DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:netware:6.5:sp5:*:*:*:*:*:*", "matchCriteriaId": "0F7A41C8-4332-4F8C-A297-6850C05B3EB6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NWFTPD.nlm before 5.06.05 in the FTP server in Novell NetWare 6.5 SP5 allows attackers to have an unspecified impact via vectors related to passwords." }, { "lang": "es", "value": "NWFTPD.nlm anterior a v5.06.05 para el servidor FTP de Novell NetWare v6.5 SP5 permite a los atacantes tener un impacto no especificado a trav\u00e9s de vectores relacionados con las contrase\u00f1as -passwords-." } ], "id": "CVE-2005-4887", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-04-05T15:30:00.827", "references": [ { "source": "cve@mitre.org", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/viewContent.do?externalId=3238588\u0026sliceId=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=133977" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…