{"vuid":"VU#185593","idnumber":"185593","name":"Novell NetWare Enterprise Web Server /perl/ handler vulnerable to buffer overflow","keywords":["Novell","Netware Enterprise Server","buffer overflow","long string of characters","perl handler","CGI2PERL.NLM","TID 2966549","abend","NOVL-2003-2966549"],"overview":"Novell NetWare Enterprise Web Server contains a buffer overflow vulnerability that can be exploited via the /perl/ HTTP request handler. A remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the server process.","clean_desc":"Novell NetWare 5.1 and 6.0 include a web server called NetWare Enterprise Server. The server contains a buffer overflow vulnerability that can be triggered by a specially crafted HTTP request directed to the /perl/ handler. The vulnerability occurs in the module CGI2PERL.NLM, which is mapped to the /perl/ directory in an HTTP request. Further information is available in Novell Technical Information Document 2966549 and PROTEGO Security Advisory #PSA200301. NetWare 5.1 with NetWare Enterprise Web Server 3.6 and certain NetWare 6.0 systems (NetWare Enterprise Web Server 6.00d) are affected. In particular, NetWare 6.0 systems that have been upgraded from 5.1 may be affected.","impact":"A remote attacker could cause the web server to hang or restart (ABEND), resulting in a denial of service. It may be possible for the attacker to execute arbitrary code with the privileges of the server process (Admin).","resolution":"Apply a patch\nApply the appropriate patch referenced in Novell TID 2966549.","workarounds":"Unmap /perl/ handler If it is not needed, unmap the /perl/ request handler. Information about how to configure the /perl/ CGI directory can be found in Novell's Perl documentation for Netware Enterprise Web Server.","sysaffected":"","thanks":"This vulnerability was reported by Uffe Nielsen of \nPROTEGO","author":"This document was written by Art Manion.","public":["http://www.protego.dk/advisories/200301.html","http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966549.htm","http://developer.novell.com/ndk/doc/perl5/prl57enu/data/hyyq6w6r.html","http://developer.novell.com/ndk/doc/general/glossenu/data/alffzwf.html","http://www.secunia.com/advisories/9345/"],"cveids":["CVE-2003-0562"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-23T15:37:18Z","publicdate":"2003-07-23T00:00:00Z","datefirstpublished":"2003-07-23T15:02:48Z","dateupdated":"2003-08-08T21:58:41Z","revision":37,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"7","cam_impact":"10","cam_easeofexploitation":"11","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.21875","cam_scorecurrentwidelyknown":"8.6625","cam_scorecurrentwidelyknownexploited":"14.4375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.21875,"vulnote":null}